Home | Amazing | Today | Tags | Publishers | Years | Search 
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations

My first encounter with software configuration management was way back in the eighties while at university – and way before I knew that it was called software configuration management. We were doing a student project and were five people working on this group project. I was coding away, slipping into experiments that eventually took the...

Microsoft Dynamics CRM 2011 Step by Step
Microsoft Dynamics CRM 2011 Step by Step

Welcome to Microsoft Dynamics CRM 2011 Step by Step! Most likely, your organization has implemented—or is considering implementing—a Microsoft Dynamics CRM system, and you’re ready to learn more about what the software can do. Whether you’re a sales associate following up with your top accounts, a marketing...

Computer Facial Animation
Computer Facial Animation

This book is about computer facial models, computer-generated facial images, and facial animation. In particular, it addresses the principles of creating face models and the manipulation or control of computer-generated facial attributes. In addition, various sections in the book describe and explain the development of specific computer...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)
iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)

In case you haven’t heard, the digital camera market is exploding. At this point, a staggering 98 percent of cameras sold are digital cameras. It’s taken a few decades—the underlying technology used in most digital cameras was invented in 1969—but film photography has been reduced to a niche activity.

...

Lectures in Game Theory for Computer Scientists
Lectures in Game Theory for Computer Scientists

Game playing is a powerful metaphor that fits many situations where interaction between autonomous agents plays a central role. Numerous tasks in computer science, such as design, synthesis, verification, testing, query evaluation, planning, etc. can be formulated in game-theoretic terms. Viewing them abstractly as games reveals the...

Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture
Data Integration Blueprint and Modeling: Techniques for a Scalable and Sustainable Architecture

Making Data Integration Work: How to Systematically Reduce Cost, Improve Quality, and Enhance Effectiveness

 

Today’s enterprises are investing massive resources in data integration. Many possess thousands of point-to-point data...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Software and Patents in Europe (Cambridge Intellectual Property and Information Law)
Software and Patents in Europe (Cambridge Intellectual Property and Information Law)

The computer program exclusion from Article 52 of the European Patent Convention (EPC) proved impossible to uphold as industry moved over to digital technology, and the Boards of Appeal of the European Patent Organisation (EPO) felt emboldened to circumvent the EPC in Vicom by creating the legal fiction of 'technical effect'. This...

Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy