Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

SOA with .NET (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA with .NET (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)

The Authoritative Guide to Building Service-Oriented Solutions with Microsoft .NET Technologies and the Windows Azure Cloud Computing Platform

In SOA with .NET and Windows Azure, top Microsoft technology experts team up with Thomas Erl to explore service-oriented computing with Microsoft’s...

Introduction to Software Process Improvement (Undergraduate Topics in Computer Science)
Introduction to Software Process Improvement (Undergraduate Topics in Computer Science)
The objective of this book is to give an introduction to the software process improvement field to computer science students. The well-known Capability Maturity Model Integration (CMMI1) is used as the vehicle for software process improvement as it has become the de facto standard2 for implementing best practice in software...
Practices for Scaling Lean & Agile Development: Large, Multisite, and Offshore Product Development with Large-Scale Scrum
Practices for Scaling Lean & Agile Development: Large, Multisite, and Offshore Product Development with Large-Scale Scrum

Lean and Agile Development for Large-Scale Products: Key Practices for Sustainable Competitive Success

 

Increasingly, large product-development organizations are turning to lean thinking, agile principles and practices, and large-scale Scrum to...

JSF 2.0 Cookbook
JSF 2.0 Cookbook

JavaServer Faces is a Java-based Web application framework intended to simplify development of user interfaces for Java EE applications. You may already be aware of the laborious search through reference guides and documentation to develop your JSF applications. With the JSF Cookbook, you can find solutions to the most common JSF problems in...

Python Text Processing with NLTK 2.0 Cookbook
Python Text Processing with NLTK 2.0 Cookbook

Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best...

Information Optics and Photonics: Algorithms, Systems, and Applications
Information Optics and Photonics: Algorithms, Systems, and Applications

This book will address the advances, applications, research results, and emerging areas of optics, photonics, computational approaches, nano-photonics, bio-photonics, with applications in information systems. The objectives are to bring together novel approaches, analysis, models, and technologies that enhance sensing, measurement,...

The Excel Analyst's Guide to Access
The Excel Analyst's Guide to Access

The ultimate handbook for Excel analysts who need reporting solutions using Access

Excel and Access are intended to work together. This book offers a comprehensive review of the extensive analytical and reporting functionality that Access provides and how it enhances Excel reporting functions.

Sales managers, operations...

Electronics Explained: The New Systems Approach to Learning Electronics
Electronics Explained: The New Systems Approach to Learning Electronics

This book is for those of you who want to learn about electronics and computers but frankly are put off by all the gory details. If you have a short attention span, a nonexistent background in science, math, and technology, and are looking for near-instant gratification of electronics knowledge, this book is for you. Electronics is a complex...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

LINQ to Objects Using C# 4.0: Using and Extending LINQ to Objects and Parallel LINQ (PLINQ)
LINQ to Objects Using C# 4.0: Using and Extending LINQ to Objects and Parallel LINQ (PLINQ)

“For several years, Troy has been one of the key figures in the LINQ community. This comprehensive and well-written book serves as a compendium of the important wisdom and experience that he has accumulated through his years of studying LINQ and its uses.”

...

Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy