Home | Amazing | Today | Tags | Publishers | Years | Search 
The Complete Idiot's Guide to iPad and iPhone App Development
The Complete Idiot's Guide to iPad and iPhone App Development

One of the principles to keep in mind when developing iPad and iPhone apps is designing for short bursts of activity. Think about how you use your own mobile device. Likely, you open an app, use it for a spell, and close it. This book is written using the same philosophy. Each chapter is bite-size, and exercises never span more than one...

International Encyclopedia of the Social Sciences (9 vol. set)
International Encyclopedia of the Social Sciences (9 vol. set)

Late in 2004 I received a telephone call from Hélène Potter, director of new product development for Macmillan Reference USA—an imprint of Gale. I did not realize immediately that it was the telephone call that would shape a large share of my intellectual activity for the next three years. In fact, I recall hearing about a...

Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations
IBM Rational ClearCase 7.0: Master the Tools That Monitor, Analyze, and Manage Software Configurations

My first encounter with software configuration management was way back in the eighties while at university – and way before I knew that it was called software configuration management. We were doing a student project and were five people working on this group project. I was coding away, slipping into experiments that eventually took the...

Microsoft Dynamics CRM 2011 Step by Step
Microsoft Dynamics CRM 2011 Step by Step

Welcome to Microsoft Dynamics CRM 2011 Step by Step! Most likely, your organization has implemented—or is considering implementing—a Microsoft Dynamics CRM system, and you’re ready to learn more about what the software can do. Whether you’re a sales associate following up with your top accounts, a marketing...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Software and Patents in Europe (Cambridge Intellectual Property and Information Law)
Software and Patents in Europe (Cambridge Intellectual Property and Information Law)

The computer program exclusion from Article 52 of the European Patent Convention (EPC) proved impossible to uphold as industry moved over to digital technology, and the Boards of Appeal of the European Patent Organisation (EPO) felt emboldened to circumvent the EPC in Vicom by creating the legal fiction of 'technical effect'. This...

Lectures in Game Theory for Computer Scientists
Lectures in Game Theory for Computer Scientists

Game playing is a powerful metaphor that fits many situations where interaction between autonomous agents plays a central role. Numerous tasks in computer science, such as design, synthesis, verification, testing, query evaluation, planning, etc. can be formulated in game-theoretic terms. Viewing them abstractly as games reveals the...

Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy