Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
iText in Action: Creating and Manipulating PDF
iText in Action: Creating and Manipulating PDF
Imagine a publisher who wants to "stamp" his ebooks on the fly with the name of the buyer (to discourage sharing). Such a publisher would (and we know one who does) use iText for the task. Developers looking to enhance web- and other applications with dynamic PDF document generation and/or manipulation will find this book unique in...
Formal Syntax and Semantics of Programming Languages: A Laboratory Based Approach
Formal Syntax and Semantics of Programming Languages: A Laboratory Based Approach
This text developed out of our experiences teaching courses covering the formal semantics of programming languages. Independently we both developed laboratory exercises implementing small programming languages in Prolog following denotational definitions. Prolog proved to be an excellent tool for illustrating the formal semantics of programming...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Adobe Scripting: Your Visual Blueprint to Scripting in Photoshop and Illustrator
Adobe Scripting: Your Visual Blueprint to Scripting in Photoshop and Illustrator
Combining clear, step-by-step screen shots with minimal text, our five Visual series are the ultimate resources for visual learners, who represent up to forty percent of your customers.
Teach Yourself VISUALLY guides help computer users get up to speed on a wide range of office productivity, graphics, and Web design software. Offering
...
CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
Computer Algebra and Symbolic Computation: Mathematical Methods
Computer Algebra and Symbolic Computation: Mathematical Methods
Computer algebra is the field of mathematics and computer science that is concerned with the development, implementation, and application of algorithms that manipulate and analyze mathematical expressions. This book and the companion text, Computer Algebra and Symbolic Computation: Mathematical Methods, are an introduction to the subject that...
Frontiers of High Performance Computing and Networking  ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
Frontiers of High Performance Computing and Networking ISPA 2006 Workshops: ISPA 2006 International Workshops FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006 (see LNCS 4330).

The 116 revised full papers presented were carefully reviewed and selected from...

Data Modeling Fundamentals: A Practical Guide for IT Professionals
Data Modeling Fundamentals: A Practical Guide for IT Professionals
The purpose of this book is to provide a practical approach for IT professionals to acquire the necessary knowledge and expertise in data modeling to function effectively. It begins with an overview of basic data modeling concepts, introduces the methods and techniques, provides a comprehensive case study to present the details of the data model...
Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Meditation For Dummies (Book and CD edition)
Meditation For Dummies (Book and CD edition)
"An easy-to-follow yet comprehensive introduction to the practice of meditation."

—John Gray, author of Men Are from Mars, Women Are from Venus

Research has proven that meditation relaxes the body, calms the mind, reduces stress, and enhances overall health and well-being. Whether you're new to meditation...

How to Do Everything with Web 2.0 Mashups
How to Do Everything with Web 2.0 Mashups
Few developments in the world of computers have been embraced as quickly as mashups. The most common mashups remain those that build on the various mapping APIs, but dynamic combinations of data from multiple sources or in multiple formats (the basic definition of a mashup) are all over the Web. Part I of this book provides an introduction to the...
Mobile 3D Graphics: with OpenGL ES and M3G (The Morgan Kaufmann Series in Computer Graphics)
Mobile 3D Graphics: with OpenGL ES and M3G (The Morgan Kaufmann Series in Computer Graphics)
Graphics and game developers must learn to program for mobility. This book will teach you how.

"This book - written by some of the key technical experts...provides a comprehensive but practical and easily understood introduction for any software engineer seeking to delight the consumer with rich 3D interactive experiences on their
...
unlimited object storage image
Result Page: 2276 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 2260 2259 2258 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy