Home | Amazing | Today | Tags | Publishers | Years | Search 
Lisp
Lisp

This third edition is a revised and expanded version of Winston and Horn's best-selling introduction to the Lisp programming language and to Lisp-based applications, many of which are possible as a result of advances in Artificial Intelligence technology. The Knowledge You Need The new edition retains the broad coverage of previous...

Information Systems Transformation: Architecture-Driven Modernization Case Studies
Information Systems Transformation: Architecture-Driven Modernization Case Studies

Every major enterprise has a significant installed base of existing software systems that reflect the tangled IT architectures that result from decades of patches and failed replacements. Most of these systems were designed to support business architectures that have changed dramatically. At best, these systems hinder agility and...

Models and Languages of Object-Oriented Databases (International Computer Science Series)
Models and Languages of Object-Oriented Databases (International Computer Science Series)

Brings together key developments in OO databases from areas such as semantic modelling, formal data models, language design issues, object algebra and rule-based query languages. Shows how these elements may interact within an object-oriented database system. Paper. DLC: Object-oriented database.

Object-oriented databases have been...

Network Processors: Architecture, Programming, and Implementation (Systems on Silicon)
Network Processors: Architecture, Programming, and Implementation (Systems on Silicon)

Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the...

Professional WPF Programming: .NET Development with the Windows Presentation Foundation
Professional WPF Programming: .NET Development with the Windows Presentation Foundation

Professional WPF Programming

If you want to learn how to build killer user interfaces for Windows and the web, then this book is for you. It arms you with the tools and code you'll need to effectively utilize the Windows Presentation Foundation (WPF). From creating appealing graphics and animated structures to enhancing...

Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security
Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security

Assist Telco and ISP engineers and technicians in their transition to IP telephony

  • Assists traditional telco engineers and technicians in designing, implementing, and supporting VoIP networks
  • Provides a step-by-step approach to designing a VoIP network
  • Outlines each VoIP...
JavaScript for Absolute Beginners (Getting Started)
JavaScript for Absolute Beginners (Getting Started)

If you are new to both JavaScript and programming, this hands-on book is for you. Rather than staring blankly at gobbledygook, you'll explore JavaScript by entering and running hundreds of code samples in Firebug, a free JavaScript debugger. Then in the last two chapters, you'll leave the safety of Firebug and hand-code an uber cool...

C++ Database Development
C++ Database Development

Learn the fundamentals of creating and using object oriented databases with C++ Database Development, 2nd Edition. This comprehensive guide covers the history and principles of database management, advanced techniques for designing and writing C++ persistent object database programs, and using PARODY the Persistent, Almost-Relational...

Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Office 2010 Bible
Office 2010 Bible

The best of the best from the bestselling authors of Excel, Word, and PowerPoint Bibles!

Take your pick of applications from the Office 2010 suite and your choice of leading experts to show you how to use them. This Office 2010 Bible features the best-of-the-best content from the Excel 2010 Bible,...

Computer Networks ISE: A Systems Approach
Computer Networks ISE: A Systems Approach

I what has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergenceof voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid security...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Result Page: 604 603 602 601 600 599 598 597 596 595 594 593 592 591 590 589 588 587 586 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy