Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Adobe AIR For Dummies (Computer/Tech)
Adobe AIR For Dummies (Computer/Tech)
Want to create rich Internet applications and RIA desktop apps that run seamlessly online and offline? Adobe AIR —Adobe Integrated Runtime — makes it possible; Adobe AIR For Dummies makes it easy.

AIR allows Web developers to create rich Internet applications using Web technologies. They run on desktops and across...

Bioinformatics Programming Using Python: Practical Programming for Biological Data (Animal Guide)
Bioinformatics Programming Using Python: Practical Programming for Biological Data (Animal Guide)

Powerful, flexible, and easy to use, Python is an ideal language for building software tools and applications for life science research and development. This unique book shows you how to program with Python, using code examples taken directly from bioinformatics. In a short time, you'll be using sophisticated techniques and...

Handbook of Software Engineering and Knowledge Engineering, Volume 1
Handbook of Software Engineering and Knowledge Engineering, Volume 1

This is the first handbook to cover comprehensively both software engineering and knowledge engineering - two important fields that have become interwoven in recent years. Over 60 international experts have contributed to the book. Each chapter has been written in such a way that a practitioner of software engineering and knowledge...

Data Analysis Using SAS Enterprise Guide
Data Analysis Using SAS Enterprise Guide

The present book, Data Analysis Using SAS Enterprise Guide, provides readers with an overview of Enterprise Guide, the newest point-and-click interface from SAS. SAS Enterprise Guide is a graphical user (point-and-click) interface to the main SAS application, having relatively recently replaced the Analyst interface, which itself had replaced...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!

Microsoft Visio 2010 is a bold new release. If you’re new to Visio, your timing is excellent! This version of Visio is easier to use than ever before and yet the diagrams you create can have more impact and style, and can present more real-world data than in any previous version.

If you’ve used prior versions...

Software Development on a Leash (Expert's Voice)
Software Development on a Leash (Expert's Voice)

Software Development on a Leash is designed as a roadmap for experienced developers and architects who are interested in implementing a turbocharged software development process that encourages reuse and innovation. Author David Birmingham's products have been successfully deployed in a variety of venues, including...

Williams Textbook of Endocrinology, 11e
Williams Textbook of Endocrinology, 11e

In your complex and dynamic field, it can be a struggle to continually integrate the latest scientific and clinical information into your everyday patient care. The 11th Edition of this beloved reference is the solution! Leading authorities provide just the right blend of scientific insight and clinical know-how to help you overcome any...

Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Java APIs, Extensions and Libraries: With JavaFX, JDBC, jmod, jlink, Networking, and the Process API
Java APIs, Extensions and Libraries: With JavaFX, JDBC, jmod, jlink, Networking, and the Process API
This book completes the Apress Java learning journey and is a comprehensive approach to learning Java APIs, extensions, and modules such as Java EE integration, mobile Java modules, JavaFX, and JDBC. In this book, you'll learn how to build user interfaces with Swing and JavaFX as well as how to write network programs with the...
unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 343 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy