|
|
|
|
A UML Pattern Language (Macmillan Technology Series)This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called... | | Macromedia Flash MX 2004 Killer TipsThe hottest collection of cool tips and hidden secrets for the Flash MX 2004 user who needs results fast! In today's economy, time is money. Flash MX 2004 Killer Tips is all about speed, showing users how to get more work done in less time. This book is designed to increase productivity (and... | | Practical C++ Programming, Second EditionThis book is devoted to practical C++ programming. It teaches you not only the mechanics of the language, but also style and debugging. The entire life cycle of a program is discussed, including conception, design, writing, debugging, release, documentation, maintenance, and revision.
Style is emphasized.... |
|
|
Black Art of Java Game ProgrammingGaming on the Web is the next blockbuster business. Have any doubts? The video game industry, which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area. Software developers are busily porting games to the online environment, or developing entirely new ones. And numerous popular Web sites, many... | | Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... | | Electronic Monitoring in the Workplace: Controversies and SolutionsDue to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the... |
|
Data Compression: The Complete ReferenceGiambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have... | | LightWave 3D 8: 1001 Tips & TricksIf you’re in the bookstore reading this book, buy it. It will be one of the best investments you can make. There are years of experience in this book, and it will become your favorite secret weapon. William “Proton” Vaughan
What’s the next best thing to having an experienced LightWave artist at your... | | The Rise and Decline of the StateThe state, which since the middle of the seventeenth century has been the most important and most characteristic of all moderninstitutions, is in decline. From Western Europe to Africa, either voluntarily or involuntarily, many existing states are either combining into larger communities or falling apart. Regardless of whether they fall apart or... |
|
|
Result Page: 1863 1862 1861 1860 1859 1858 1857 1856 1855 1854 1853 1852 1851 1850 1849 1848 1847 1846 1845 |