Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Angst bewältigen: Selbsthilfe bei Panik und Agoraphobie - Den Rückfall vermeiden - Fallbeispiele und konkrete Tipps (German Edition)
Angst bewältigen: Selbsthilfe bei Panik und Agoraphobie - Den Rückfall vermeiden - Fallbeispiele und konkrete Tipps (German Edition)

Angst und Panik bewältigen

Panikartige Ängste sind enorm verbreitet. Die Angstzustände sind verbunden mit meist heftigen körperlichen Reaktionen, wie Schwindel, Herzklopfen oder Schweißausbrüchen. Sie quälen und schränken Betroffene zusehends ein. Angstpatientinnen und -patienten...

Hadoop Real World Solutions Cookbook
Hadoop Real World Solutions Cookbook

Ever felt you could use some no-nonsense, practical help when developing applications with Hadoop? Well, you've just found it. This real-world solutions cookbook is packed with handy recipes you can apply to your own everyday issues.

Overview

  • Solutions to common problems when working in the Hadoop...
OCA Java SE 7 Programmer I Certification Guide: Prepare for the 1ZO-803 exam
OCA Java SE 7 Programmer I Certification Guide: Prepare for the 1ZO-803 exam

Summary

This book is a comprehensive guide to the 1Z0-803 exam. You'll explore a wide range of important Java topics as you systematically learn how to pass the certification exam. Each chapter starts with a list of the exam objectives covered in that chapter. You'll find sample questions and exercises...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Ideas of Quantum Chemistry, Second Edition
Ideas of Quantum Chemistry, Second Edition

Ideas of Quantum Chemistry shows how quantum mechanics is applied to chemistry to give it a theoretical foundation. From the Schroedinger equation to electronic and nuclear motion to intermolecular interactions, this book covers the primary quantum underpinnings of chemical systems. The structure of the book (a TREE-form) emphasizes...

WordPress Web Application Development
WordPress Web Application Development

Developing WordPress-powered websites is one of the standout trends in the modern web development world. The flexibility and power of the built-in features offered by WordPress has made developers turn their attentions to the possibility of using it as a web development framework. This book will act as a comprehensive resource for building...

Development of Novel Anti-HIV Pyrimidobenzothiazine Derivatives (Springer Theses)
Development of Novel Anti-HIV Pyrimidobenzothiazine Derivatives (Springer Theses)

The author successfully developed novel anti-HIV PD 404182 derivatives that exhibited submicromolar inhibitory activity against both HIV-1 and HIV-2. His thesis is in three parts. The first part expounds efficient methods for the synthesis of tricyclic heterocycles related to PD 404182 based on the...

Rapid BeagleBoard Prototyping with MATLAB and Simulink
Rapid BeagleBoard Prototyping with MATLAB and Simulink

Leverage the power of BeagleBoard to develop and deploy practical embedded projects

Overview

  • Develop and validate your own embedded audio/video applications rapidly with Beagleboard
  • Create embedded Linux applications on a pure Windows PC
  • Full of illustrations, diagrams, and...
Mac Hacks: Tips & Tools for unlocking the power of OS X
Mac Hacks: Tips & Tools for unlocking the power of OS X

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...

Android Game Recipes: A Problem-Solution Approach
Android Game Recipes: A Problem-Solution Approach

Android game apps are typically the most popular type of Android apps in the various Google Play, Amazon Appstore and other Android app stores. So, beyond the Android game tutorials out there, what about a day-to-day handy and complete code reference for Android game developers?

Android Game Recipes is your first, reliable...

Artificial Intelligence in Power System Optimization
Artificial Intelligence in Power System Optimization

With the considerable increase of AI applications, AI is being increasingly used to solve optimization problems in engineering. In the past two decades, the applications of artificial intelligence in power systems have attracted much research. This book covers the current level of applications of artificial intelligence to the optimization...

unlimited object storage image
Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy