Home | Amazing | Today | Tags | Publishers | Years | Search 
Capturing Better Photos and Video with your iPhone
Capturing Better Photos and Video with your iPhone

Building a camera into a phone makes total sense. Th ese days, nearly everyone carries a cell phone with them at all times; and nearly everyone owns a small digital camera to take snapshots of things that are happening in their life. So putting the two together was a no-brainer. Why carry two things when you can carry one?

...

Web Engineering: A Practioner's Approach
Web Engineering: A Practioner's Approach

As we began to plan this book, we worried that it would become lost in the hundreds—no, thousands—of volumes that have been written on “Web design,” HTML, Java, XML, or any of the myriad technologies that must be understood to build successful Web-based systems and applications (WebApps). To our surprise, we...

The Internet and American Business (History of Computing)
The Internet and American Business (History of Computing)

The effect of a commercialized Internet on American business, from the boom in e-commerce and adjustments by bricks-and-mortar businesses to file-sharing and community building.

When we think of the Internet, we generally think of Amazon, Google, Hotmail, Napster, MySpace, and a host of other sites for buying products, searching...

Programming Android
Programming Android

The purpose of this book is to enable you to create well-engineered Android applications that go beyond the scope of small example applications.

This book is for people coming to Android programming from a variety of backgrounds. If you have been programming iPhone or Mac OS applications in Objective-C, you will...

Microsoft Exchange 2010 PowerShell Cookbook
Microsoft Exchange 2010 PowerShell Cookbook

The book is full of immediately-usable task-based recipes for managing and maintaining your Microsoft Exchange 2010 environment with Windows PowerShell 2.0 and the Exchange Management Shell. The focus of this book is to show you how to automate routine tasks and solve common problems. While the Exchange Management Shell provides hundreds of...

Microsoft Visual Basic 2008: Complete Concepts and Techniques (Shelly Cashman)
Microsoft Visual Basic 2008: Complete Concepts and Techniques (Shelly Cashman)

The Shelly Cashman Series® offers the finest textbooks in computer education. This Microsoft Visual Basic 2008 book utilizes an innovative step-by-step pedagogy, which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

HBase: The Definitive Guide
HBase: The Definitive Guide

You may be reading this book for many reasons. It could be because you heard all about Hadoop and what it can do to crunch petabytes of data in a reasonable amount of time. While reading into Hadoop you found that, for random access to the accumulated data, there is something called HBase. Or it was the hype that is prevalent these days...

Just Spring
Just Spring

Get a concise introduction to Spring, the increasingly popular open source framework for building lightweight enterprise applications on the Java platform. This example-driven book for Java developers delves into the framework's basic features, as well as advanced concepts such as containers. You'll learn how Spring makes...

Deploying OpenStack
Deploying OpenStack

This book is aimed at developers, technologists, and system administrators eager to understand and deploy cloud computing infrastructure projects based upon OpenStack software. It is intended to provide the reader with a solid understanding of the Open- Stack project goals, details of specific OpenStack software components,...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

CompTIA Security+ SYO-201 Cert Guide
CompTIA Security+ SYO-201 Cert Guide

Welcome to the CompTIA Security+ SY0-201 Cert Guide. The CompTIA Security+ Certification is widely accepted as the first security certification you should attempt to attain in your information technology (IT) career. The CompTIA Security+ Certification is designed to be a vendor-neutral exam that measures your knowledge of...

Professional Android 2 Application Development (Wrox Programmer to Programmer)
Professional Android 2 Application Development (Wrox Programmer to Programmer)

Build unique mobile applications with the latest Android SDK

Written by an Android authority, this up-to-date resource shows you how to leverage the features of Android 2 to enhance existing products or create innovative new ones. Serving as a hands-on guide to building mobile apps using Android, the book walks you through a series...

Result Page: 414 413 412 411 410 409 408 407 406 405 404 403 402 401 400 399 398 397 396 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy