Home | Amazing | Today | Tags | Publishers | Years | Search 
Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Beginning BlackBerry 7 Development
Beginning BlackBerry 7 Development

Are you interested in creating BlackBerry apps using the latest BlackBerry 7 and BlackBerry Java Plug-in for Eclipse? Then this is the book for you. Beginning BlackBerry 7 Development offers a hands-on approach to learning how to build and deploy sophisticated BlackBerry apps using the latest tools...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Microsoft Access 2010 Inside Out
Microsoft Access 2010 Inside Out

You're beyond the basics, so dive right in and really put your database skills to work! This supremely organized reference is packed with hundreds of timesaving solutions, troubleshooting tips, and workarounds. It's all muscle and no fluff. Discover how the experts tackle Access 2010 -- and challenge yourself to new...

Apple Training Series: iMovie ’11
Apple Training Series: iMovie ’11

Welcome to the official Apple training course for iMovie ’11, with bonus lessons on iWeb and iDVD. You don’t need to have any special background to get started, other than having a Mac (and perhaps a healthy curiosity about what you can do with it).

This ebook comprises the entire iMovie section of Apple Training...

Apple Training Series: iPhoto ’11
Apple Training Series: iPhoto ’11

Welcome to the official Apple training course for the iPhoto ’11, with bonus lessons on iWeb and iDVD. You don’t need to have any special background to get started, other than having a Mac (and perhaps a healthy curiosity about what you can do with it).

This ebook comprises the entire iPhoto section of Apple...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

Numerical Analysis Using MATLAB and Spreadsheets: Second Edition
Numerical Analysis Using MATLAB and Spreadsheets: Second Edition

Numerical analysis is the branch of mathematics that is used to find approximations to difficult problems such as finding the roots of non-linear equations, integration involving complex expressions and solving differential equations for which analytical solutions do not exist. It is applied to a wide variety of disciplines such as...

Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Result Page: 522 521 520 519 518 517 516 515 514 513 512 511 510 509 508 507 506 505 504 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy