Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and...

Aerodynamics for Engineering Students, Sixth Edition
Aerodynamics for Engineering Students, Sixth Edition

Already one of the leading course texts on aerodynamics in the UK, the sixth edition welcomes a new US-based author team to keep the text current. The sixth edition has been revised to include the latest developments in compressible flow, computational fluid dynamics, and contemporary applications. Computational methods have been expanded and...

Modern Solid State Fermentation: Theory and Practice
Modern Solid State Fermentation: Theory and Practice

“Modern Solid State Fermentation: Theory and Practice” covers state-of-the-art studies in the field of solid state fermentation (SSF). In terms of different characteristics of microbial metabolites, this book catalogs SSF into two main parts: anaerobic and aerobic SSF. Based on the principles of porous media and strategies of...

Tensor Categories and Endomorphisms of von Neumann Algebras: with Applications to Quantum Field Theory (SpringerBriefs in Mathematical Physics)
Tensor Categories and Endomorphisms of von Neumann Algebras: with Applications to Quantum Field Theory (SpringerBriefs in Mathematical Physics)

C* tensor categories are a point of contact where Operator Algebras and Quantum Field Theory meet. They are the underlying unifying concept for homomorphisms of (properly infinite) von Neumann algebras and representations of quantum observables.

The present introductory text reviews the basic notions and their cross-relations in...

Fire in the Valley: The Birth and Death of the Personal Computer
Fire in the Valley: The Birth and Death of the Personal Computer

In the 1970s, while their contemporaries were protesting the computer as a tool of dehumanization and oppression, a motley collection of college dropouts, hippies, and electronics fanatics were engaged in something much more subversive. Obsessed with the idea of getting computer power into their own hands, they launched from their garages a...

Observer's Guide to Star Clusters (The Patrick Moore Practical Astronomy Series)
Observer's Guide to Star Clusters (The Patrick Moore Practical Astronomy Series)

This book helps readers find objects in the night sky with small-, medium-, and large-aperture telescopes. It provides comprehensive coverage for identifying and locating star clusters in all relevant constellations in the northern and southern hemispheres.

...
WordPress 3.7 Complete: Third Edition
WordPress 3.7 Complete: Third Edition

Nothing has simplified website production quite as effectively as WordPress, and this book makes it easier still to build a fully featured site of your own. Packed with screenshots and clear instructions, it covers everything you need for success.

Overview

  • Learn how to build a WordPress site quickly and...
Beginning C for Arduino, Second Edition: Learn C Programming for the Arduino
Beginning C for Arduino, Second Edition: Learn C Programming for the Arduino

Beginning C for Arduino, Second Edition is written for those who have no prior experience with microcontrollers or programming but would like to experiment and learn both. Updated with new projects and new boards, this book introduces you to the C programming language, reinforcing each programming structure with a simple...

Android Security Internals: An In-Depth Guide to Android's Security Architecture
Android Security Internals: An In-Depth Guide to Android's Security Architecture

"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword

...
Joomla! 3 Beginner's Guide
Joomla! 3 Beginner's Guide

Even if you've never even begun to build a website, this guide will have you completing one within an hour. It's a fast, practical, fun introduction to Joomla! and content managed website creation.

Overview

  • Create a Joomla! website in an hour with the help of easy-to-follow steps and...
Plasmonics: From Basics to Advanced Topics (Springer Series in Optical Sciences)
Plasmonics: From Basics to Advanced Topics (Springer Series in Optical Sciences)

This book deals with all aspects of plasmonics, basics, applications and advanced developments. Plasmonics is an emerging field of research dedicated to the resonant interaction of light with metals. The light/matter interaction is strongly enhanced at a nanometer scale which sparks a keen interest of a wide scientific community and offers...

Bistatic SAR Data Processing Algorithms
Bistatic SAR Data Processing Algorithms

Synthetic Aperture Radar (SAR) is critical for remote sensing. It works day and night, in good weather or bad. Bistatic SAR is a new kind of SAR system, where the transmitter and receiver are placed on two separate platforms. Bistatic SAR is one of the most important trends in SAR development, as the technology renders SAR more flexible and...

Result Page: 2836 2835 2834 2833 2832 2831 2830 2829 2828 2827 2826 2825 2824 2823 2822 2821 2820 2819 2818 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy