Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Microsoft ASP.NET MVC
Programming Microsoft ASP.NET MVC
Until late 2008, I was happy enough with Web Forms. I did recognize its weak points and could nicely work around them with discipline and systematic application of design principles. But a new thing called ASP.NET MVC was receiving enthusiastic reviews by a growing subset of the ASP.NET community. So I started to...
CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
Neural and Fuzzy Logic Control of Drives and Power Systems
Neural and Fuzzy Logic Control of Drives and Power Systems
The idea of writing this book arose from the need to investigate the main principles of modern power electronic control strategies, using fuzzy logic and neural networks, for research and teaching. Primarily, the book aims to be a quick learning guide for postgraduate/undergraduate students or design engineers interested in...
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals
Desktop virtualization is a very broad topic, which can encompass various virtualization technologies. This book is aimed at specifically addressing how to implement a virtual desktop infrastructure (VDI) solution using Citrix XenDesktop.

This book is not meant as a definitive guide to any one of the technologies
...
Mining Complex Data (Studies in Computational Intelligence)
Mining Complex Data (Studies in Computational Intelligence)

Data mining and knowledge discovery can today be considered as stable fields with numerous efficient methods and studies that have been proposed to extract knowledge from data. Nevertheless, the famous golden nugget is still challenging. Actually, the context evolved since the first definition of the KDD process and knowledge has now...

Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

Economics of Grids, Clouds, Systems, and Services: 8th International Workshop, GECON 2011
Economics of Grids, Clouds, Systems, and Services: 8th International Workshop, GECON 2011

You are holding the proceedings of the 8th International Workshop on the Economics of Grids, Clouds, Systems, and Services. This workshop brings together the research and practitioner communities active in the area of economics and computer science to address the emerging interest in infrastructure, platform, and software services....

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

The Handbook of MPEG Applications: Standards in Practice
The Handbook of MPEG Applications: Standards in Practice

The need for compressed and coded representation and transmission of multimedia data has not rescinded as computer processing power, storage, and network bandwidth have increased. They have merely served to increase the demand for greater quality and increased functionality from all elements in the multimedia delivery and consumption...

Pro iOS Web Design and Development: HTML5, CSS3, and JavaScript with Safari
Pro iOS Web Design and Development: HTML5, CSS3, and JavaScript with Safari

These are exciting times for those who live and work with technology every day, whether they are young people who have been using technology since birth, or, like many others, have had to adapt to it.

It is an exciting moment because in recent years there is no other example of technology that has changed our lives so
...

Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
We are delighted lo present the ECDL 2004 Conference proceedings from the 8th European Conference on Research and Advanced Technology for Digital Li- braries at the University of Bath. Bath, UK. This followed an impressive and geographically dispersed series of locations for previous events: Pisa (1997). ller- aklion (1998),...
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy