Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lange's Handbook of Chemistry
Lange's Handbook of Chemistry
Perhaps it would be simplest to begin by stating the ways in which this new edition, the fourth under the aegis of the present editor, has not been changed. It remains the one-volume source of factual information for chemists, both professionals and students—the first place in which to “look it up” on the spot. The aim is to...
Integrating Facebook iOS SDK with Your Application
Integrating Facebook iOS SDK with Your Application

Optimize the social power of your applications by integrating the popular Facebook iOS SDK

Overview

  • Effectively promote your Social Applications through Facebook
  • Invite your friends to use your application
  • Learn and understand Facebook iOS features with hands-on examples
  • ...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
XNA 3.1 Game Development for Teens
XNA 3.1 Game Development for Teens

XNA 3.0 GAME DEVELOPMENT FOR TEENS is a complete guide to entry level programming and computer game development using XNA 3.0 and the Visual C# 2008 Express programming language for beginners. This book shows readers how to create and execute computer games on their PC, and then how to port their PC games over to their Xbox 360 or Zune...

A Course in Computational Number Theory (Key Curriculum Press)
A Course in Computational Number Theory (Key Curriculum Press)

A Course in Computational Number Theory uses the computer as a tool for motivation and explanation. The book is designed for the reader to quickly access a computer and begin doing personal experiments with the patterns of the integers. It presents and explains many of the fastest algorithms for working with integers. Traditional topics are...

PGP: Pretty Good Privacy
PGP: Pretty Good Privacy

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not...

Building Games with Ethereum Smart Contracts: Intermediate Projects for Solidity Developers
Building Games with Ethereum Smart Contracts: Intermediate Projects for Solidity Developers

Learn how to take your existing knowledge of Ethereum and Solidity to the next level. Hone your development skills and become more familiar with the syntax of the Solidity language by working through well-tested, well-documented intermediate-level sample projects.

You will begin by covering the basics of Ethereum,...

Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Kernel Based Algorithms for Mining Huge Data Sets: Supervised, Semi-supervised, and Unsupervised Learning
Kernel Based Algorithms for Mining Huge Data Sets: Supervised, Semi-supervised, and Unsupervised Learning

"Kernel Based Algorithms for Mining Huge Data Sets" is the first book treating the fields of supervised, semi-supervised and unsupervised machine learning collectively. The book presents both the theory and the algorithms for mining huge data sets by using support vector machines (SVMs) in an iterative way. It demonstrates how kernel...

Accessing and Browsing Information and Communication
Accessing and Browsing Information and Communication
This book contends that accessing and browsing information and communication are multidimensional and consequential aspects of the information user’s entire experience and of general human behavior. Problems in information creation, processing, transmittal, and use often arise from an incomplete conceptualization of the "information...
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center
Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud...

Beginning ASP.NET 4.5 Databases
Beginning ASP.NET 4.5 Databases

Beginning ASP.NET 4.5 Databases introduces you to the world of building data-driven Web sites using ASP.NET, ADO.NET and the Entity Framework using C#. Since ASP.NET developers need to access databases quickly and efficiently, this book teaches the best practices and methods to help developers achieve professional ASP.NET and...

unlimited object storage image
Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy