Electronic Books

Total Books: 11961 - 11980 /16568
Prions

Prion diseases recently have attracted interest not only scientifically but also socially because of the bovine spongiform ...

Lire la suite
Privacy Enhancing Technologies (vol. # 3856)

The papers in this volume represent the proceedings of the 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June ...

Lire la suite
Privacy Enhancing Technologies (vol. # 4258)

The papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...

Lire la suite
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Lire la suite
Privacy and Data Protection in Software Services

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...

Lire la suite
Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...

Lire la suite
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

Lire la suite
Privacy-Preserving Data Mining:Models and Algorithms

Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...

Lire la suite
Privacy-Respecting Intrusion Detection

With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...

Lire la suite
Private Military and Security Companies

The present collection of contributions to this topic by distinct experts in the field is unique as it covers most, if not ...

Lire la suite
Privileged structures in drug discovery : medicinal chemistry and synthesis / Larry Yet

A comprehensive guide to privileged structures and their application in the discovery of new drugs The use of privileged ...

Lire la suite
Pro .NET 2.0 Windows Forms and Custom Controls in C#

Renowned author Matthew MacDonald combines careful treatment of the API with detailed user-interface design principles. Further, ...

Lire la suite
Pro .NET 2.0 XML

XML is the de facto language for communication within and between distributed applications, whether they're on the Internet ...

Lire la suite
Pro ASP.NET 2.0 Website Programming

Pro ASP.NET 2.0 Website Programming shows you how to harness the ASP.NET technology to build websites that tackle real business ...

Lire la suite
Pro ASP.NET 3.5 in C# 2008

ASP.NET 3.5 is Microsoft's revolutionary ASP.NET technology. It is the principal standard for creating dynamic web pages ...

Lire la suite
Pro ASP.NET 3.5 in VB 2008 : Includes Silverlight 2

ASP.NET 3.5 is the principal standard for creating dynamic web pages on the Windows platform. Pro ASP.NET 3.5 in VB 2008: ...

Lire la suite
Pro Apache Beehive

If you want exposure to the new open source lightweight SOA-driven Apache Beehive framework project, then pick up Pro Apache ...

Lire la suite
Pro Apache Geronimo

Pro Apache Geronimo teaches you all about using Apache Geronimo, the open-source lightweight J2EE/Java EE 5 web application ...

Lire la suite
Pro Apache Struts and Ajax

Pro Apache Struts with Ajax maps out how to use the Apache Struts MVC web framework, so you can solve everyday web application ...

Lire la suite
Pro Apache Tomcat 6

Pro Apache Tomcat 6 is ideal for Tomcat administrators and others who want to configure Tomcat. It covers only Tomcat 6 and ...

Lire la suite
Total Books: 11961 - 11980 /16568