It has been estimated that although Microsoft Office 2007 contains more than 10,000 features, the average user is familiar with only about 150 of them. That means that most people have left a whopping 98.5 percent of Office territory unexplored. In practical terms, it also means that most people aren’t taking advantage of the power of the...
THE PAST DECADE has seen an increased interest in website performance, with businesses of all sizes realizing that even modest changes in page loading times can have a signifi cant effect on their profi ts. The move toward a faster web has been driven largely by Yahoo! and Google, which have both carried out extensive research on the subject...
iOS 7 Development Recipes: A Problem-Solution Approach is your code reference and guide to developing solutions on the iPad, iPhone, and other iOS 7 SDK devices and platforms. This book provides in-depth code samples and discussions for scenarios that developers face every day. You'll find numerous...
Adaptive techniques play a key role in modern wireless communication systems. The concept of adaptation is emphasized in the Adaptation in Wireless Communications Series through a unified framework across all layers of the wireless protocol stack ranging from the physical layer to the application layer, and from cellular systems to...
Covers iOS 9.1 and up, Xcode 7.x, iPhone, iPad, and More!
In just 24 sessions of one hour each, learn how to build powerful applications for today’s hottest handheld devices: the iPhone and iPad! Using this book’s straightforward, step-by-step approach, you’ll master every skill and technology you...
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.
Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the...
In the late 1980s, Microsoft's International Product Group (IPG), the team responsible for creating most of the localized versions of Microsoft products, distributed a booklet internally that contained guidelines for writing code that accommodated the needs of international developers and users. The International Handbook for Software...
Welcome to LEGO MINDSTORMS NXT 2.0: The King’s Treasure. Yes, it’s the sequel to LEGO
MINDSTORMS NXT: The Mayan Adventure, but no previous experience with that book is required to use
or enjoy this book. Please be aware that The Mayan Adventure used the LEGO MINDSTORMS NXT 1.0
kit which was released in 2006. The LEGO...
An excellent introduction to the design theories involved in the creation of user interfaces. Instead of the usual examples and pictures of computer screens and application menus, Mullet approaches the concept of UI from its "outside world" roots. With examples ranging from street signs to corporate logos to the map of the London...
This is a book about designing computer hardware and specifically about designing small machines for embedded applications. It is intentionally hardware specific. There are plenty of books out there on writing code for embedded systems (such as Michael Barr's excellent Programming Embedded Systems in C and C++, another...
Increasing performance demands in integrated circuits, together with limited energy budgets, force IC designers to find new ways of saving power. One innovative way is the presented adaptive voltage scaling scheme, which tunes the supply voltage according to the present process, voltage and temperature variations as well as aging. The voltage...