 |
|
 Modern Compiler Implementation in ML
Over the pasi decade, there have been several shifts in the way compilers are
built. New kinds of programming languages are being used: object-oriented
languages with dynamic methods, functional languages with nested scope
and first-class function closures; and many of these languages require garbage
collection. New machines have... |  |  Introduction to Cryptography (Undergraduate Texts in Mathematics)
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security... |  |  Java 2: The Complete Reference, Fifth Edition
The past few years document the following fact: The Web has irrevocably recast
the face of computing and programmers unwilling to master its environment will
be left behind.
The preceding is a strong statement. It is also true. More and more, applications
must interface to the Web. It no longer matters much what the... |
|
|
 Office 2010 Visual Quick Tips
Get more done in Office 2010 in less time with these Quick Tips!
Whether you're new to Microsoft Office or updating from older versions, this is the perfect resource to get you quickly up to speed on Office 2010. Every application is covered, including Word, Excel, PowerPoint, Outlook, and Publisher. Full-color... |  |  The Internet For Dummies
Welcome to The Internet For Dummies, 12th Edition. The Internet has
become so interwoven in today’s life — work, school, politics, and
play — that ignoring it is no longer an option. This book describes what you
do to become an Internaut (someone who navigates the Internet with skill) —
how to get started, what... |  |  The Python Standard Library by Example (Developer's Library)
Distributed with every copy of Python, the standard library contains hundreds of modules that provide tools for interacting with the operating system, interpreter, and Internet. All of them are tested and ready to be used to jump start the development of your applications. This book presents selected examples demonstrating how to use the most... |
|
 Designing Management Information Systems
Management information systems produce the information that managers
use to make important strategic decisions. They formthe basis for management
reports, both financial and non-financial, and as such they are a vital
component of modern business management. Few managerial decisions
are taken without consulting the data captured by... |  |  Linking Government Data
The Linked Open Data Project started just four years ago in 2007. In that short time
Linked Data has grown into an almost mainstream activity for many governments
around the world. As of this writing, the US Government’s open data site listed
twenty one countries whose governments publish open data regarding the operations
of... |  |  iPad 2: The Missing Manual
Apple announced the original iPad on January 27, 2010, and the
technology world hasn’t been the same since. Customers rushed
to buy the tablet, snapping up more than 300,000 the day it went
on sale. Competitors rushed to copy it, with Samsung, Motorola, Amazon,
and others creating their own variations on the app-friendly... |
|
Result Page: 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 |