Home | Amazing | Today | Tags | Publishers | Years | Search 
Innovations in Intelligent Machines -2: Intelligent Paradigms and Applications (Studies in Computational Intelligence)
Innovations in Intelligent Machines -2: Intelligent Paradigms and Applications (Studies in Computational Intelligence)

This research volume is a continuation of our previous volume on intelligent machines. We have laid the foundation of intelligent machines in SCI Series Volume 70 by including the possible and successful applications of computational intelligence paradigms in machines for mimicking the human behaviour.

The present volume...

Microsoft Windows Networking Essentials
Microsoft Windows Networking Essentials

Computers are very common today, and just about any computer is connected to a network. People with the knowledge and expertise to configure and maintain networks are needed in any organization.

IT administration starts with network administration in most organizations. If the computers can’t communicate on the network,...

Pharmaceutical Compounding and Dispensing
Pharmaceutical Compounding and Dispensing

Pharmacists or their pharmaceutical equivalents have been responsible for compounding medicines for cen turies. Recently this role has been challenged in the pharmaceutical literature with suggestions and recom mendations that it is inappropriate for the pharmaceu tical practitioner to compound medicines in a local pharmacy...

Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

Category Theory for Computing Science
Category Theory for Computing Science

This book is a textbook in basic category theory, written specifically to be read by researchers and students in computing science. We expound the constructions we feel are basic to category theory in the context of examples and applications to computing science. Some categorical ideas and constructions are already used heavily in computing...

iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)

In this book, the world's leading Apple platform development trainers offer a complete, practical, hands-on introduction to iPhone and iPad programming. The authors walk through all the Apple tools and technologies needed to build successful iPhone/iPad/iPod touch apps, including the iOS 4.3 SDK, the Objective-C language, Xcode 4,...

Facebook Companion
Facebook Companion

Experience everything you can do on Facebook

Facebook has taken the world by storm and just breached the 500 million-user mark as its popularity continues to increase every day the world over. Yet, despite its popularity, many people are not aware of all that Facebook has to offer. This handy, approachable guide shares...

Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications (Semantic Web and Beyond)
Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications (Semantic Web and Beyond)

The availability of geographic and geo-spatial information and services, especially on the openWeb, has become abundant in the last several yearswith the proliferation of online maps, geo-coding services, geospatial Web services and geospatially enabled applications. Concurrently, the need for geo-spatial reasoning has significantly...

Efficient Graph Rewriting and Its Implementation (Lecture Notes in Computer Science)
Efficient Graph Rewriting and Its Implementation (Lecture Notes in Computer Science)

Graph rewriting systems have come of age. In autumn 1994, the 25th anniversary of the first publication in this area was celebrated at the 5th Workshop on Graph Grammars and their Applications to Computer Science. In the interim, the subject has evolved. The current situation can be described by a three-stage model. At the very low...

Designing Embedded Hardware
Designing Embedded Hardware

This is a book about designing computer hardware and specifically about designing small machines for embedded applications. It is intentionally hardware specific. There are plenty of books out there on writing code for embedded systems (such as Michael Barr's excellent Programming Embedded Systems in C and C++, another...

iOS Development using MonoTouch Cookbook
iOS Development using MonoTouch Cookbook
Technology is advancing quite rapidly. Portable devices, such as media players, smartphones, and tablets, have brought huge advancements and changes in the way people communicate, share, and consume digital content. Developers need to be up-to-date with the available platforms these devices work on, if they want to be "part of the...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Result Page: 47 46 45 44 43 42 41 40 39 38 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy