Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by...

Strategies and Tactics in Organic Synthesis, Volume 9
Strategies and Tactics in Organic Synthesis, Volume 9

A classic in the area of organic synthesis, Strategies and Tactics in Organic Synthesis provides a forum for investigators to discuss their approach to the science and art of organic synthesis. Rather than a simple presentation of data or a secondhand analysis, we are given stories that vividly demonstrate the power of the human...

Cinema 4D R14 Cookbook, 2nd Edition
Cinema 4D R14 Cookbook, 2nd Edition

Elevate your art to the fourth dimension with Cinema 4D R14

Overview

  • Master all the important aspects of Cinema 4D
  • Learn how real-world knowledge of cameras and lighting translates onto a 3D canvas
  • Learn advanced features like Mograph, Xpresso, Dynamics, Sculpting, and...
Pentaho 5.0 Reporting by Example: Beginner's Guide
Pentaho 5.0 Reporting by Example: Beginner's Guide

Learn to use the power of Pentaho for Business Intelligence reporting in a series of simple, logical stages. From installation in Windows or Linux right through to publishing your own Java web application, it's all here.

Overview

  • Install and configure PRD in Linux and Windows
  • Create...
Android Application Security Essentials
Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.

Overview

  • Understand Android security from kernel to the application layer
  • Protect...
Multimodal Brain Image Analysis: Third International Workshop, MBIA 2013, Held in Conjunction with MICCAI 2013, Nagoya, Japan, September 22, 2013, Proceedings (Lecture Notes in Computer Science)
Multimodal Brain Image Analysis: Third International Workshop, MBIA 2013, Held in Conjunction with MICCAI 2013, Nagoya, Japan, September 22, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of the Third International Workshop on Multimodal Brain Image Analysis, MBIA 2013, held in Nagoya, Japan, on September 22, 2013 in conjunction with the 16th International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI. The 24 revised full papers presented were...

Implementing Domain-Specific Languages with Xtext and Xtend
Implementing Domain-Specific Languages with Xtext and Xtend

If you know Eclipse then learning how to implement a DSL using Xtext is a natural progression. And this guide makes it easy to get started through a step-by-step approach accompanied with simple examples.

Overview

  • Learn to quickly develop a domain-specific language with Xtext
  • Implement any...
Microsoft Visual C++/CLI Step by Step
Microsoft Visual C++/CLI Step by Step

Your hands-on guide to Visual C++/CLI fundamentals

Expand your expertise—and teach yourself the fundamentals of the Microsoft Visual C++/CLI language. If you have previous programming experience but are new to Visual C++, this tutorial delivers the step-by-step guidance and coding exercises you need to...

Trends in Stem Cell Proliferation and Cancer Research (English and Bengali Edition)
Trends in Stem Cell Proliferation and Cancer Research (English and Bengali Edition)

The book will discuss the molecular mechanisms of cancer diseases, stem cell proliferation and transformation into cancer cells beyond the physiological processes that occur in normal stem cell biology. Some of the key oncogenic events in cancer and their signaling pathways that regulate cell division cycle progression will be described...

Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed...

Jump Start Rails
Jump Start Rails

Jump Start Rails provides you with a fun and yet practical introduction to Rails, an incredibly popular framework that makes it possible to quickly develop incredibly powerful web applications with Ruby. This short book covers Rails 4, the latest version of the framework, and while it's not intended to be a completely comprehensive Rails...

Correct-by-Construction Approaches for SoC Design
Correct-by-Construction Approaches for SoC Design

This book describes an approach for designing Systems-on-Chip such that the system meets precise mathematical requirements. The methodologies presented enable embedded systems designers to reuse intellectual property (IP) blocks from existing designs in an efficient, reliable manner, automatically generating correct SoCs from multiple,...

Result Page: Previous 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy