 |
|
 Numerical Methods in Engineering with MATLABThis book is targeted primarily toward engineers and engineering students of advanced standing (sophomores, seniors and graduate students). Familiarity with a computer language is required; knowledge of basic engineering subjects is useful, but not essential.
The text attempts to place emphasis on numerical methods, not... |  |  Relevance in ArgumentationA textbook for a graduate or advanced undergraduate course in such fields as philosophy, law, artificial intelligence, linguistics, cognitive science, and speech communications. It explains how to evaluate the relevance of arguments, using examples and drawing on a new dialectical theory of relevance.
The purpose of this book is to... |  |  The Healthy PC: Preventive Care and Home Remedies for Your ComputerKeep Your PC Running Smoothly--Without Spending a Lot of Money!
Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely... |
|
 |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |  |  Introduction to Simulink with Engineering Applications This text is an introduction to Simulink ®, a companion application to MATLAB ®. It is written for students at the undergraduate and graduate programs, as well as for the working professional. Although some previous knowledge of MATLAB would be helpful, it is not absolutely necessary; Appendix A of this text is an... |
|
 |  |  Programming Spiders, Bots, and Aggregators in JavaThe content and services available on the web continue to be accessed mostly through direct human control. But this is changing. Increasingly, users rely on automated agents that save them time and effort by programmatically retrieving content, performing complex interactions, and aggregating data from diverse sources. Programming Spiders,... |  |  Java Development with AntThis book is about Ant, the award-winning Java build tool. Ant has become the centerpiece of so many projects’ build processes because it is easy to use, is platform independent, and addresses the needs of today’s projects to automate testing and deployment. From its beginnings as a helper application to compile Tomcat, Sun’s (now... |
|
 Eclipse in Action: A Guide for the Java Developer"The technical information is dead on...I'd definitely recommend this book to anyone."
This book is a fast-paced but thorough guide to the effective use of Eclipse's features and plugins for real-world Java development. Interesting examples demonstrate how to use Eclipse to build, test, and debug applications using... |  |  Phishing ExposedPhishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with... |  |  Hack Proofing Your Network: Internet TradecraftThis is a book about hacking. It’s not a novel about a set of elusive cyberpunks, it’s a do-it-yourself manual. Are we trying to tell you how to break into other people’s systems? No, we’re trying to help you make your own systems more secure by breaking into them yourself. Yes, this has the side effect that you might learn... |
|
| Result Page: 715 714 713 712 711 710 709 708 707 706 705 704 703 702 701 700 699 698 697 |