Home | Amazing | Today | Tags | Publishers | Years | Search 
Leveraging Drupal: Getting Your Site Done Right (Wrox Programmer to Programmer)
Leveraging Drupal: Getting Your Site Done Right (Wrox Programmer to Programmer)

As an open source, community-based content management system and web site application development framework, Drupal allows you to create interactive, media-based, database-driven web sites that become a part of everyday activities and communications. This unique book is the first of its kind to tackle the challenging task of leveraging Drupal...

Richard Dawkins: How a Scientist Changed the Way We Think: Reflections by Scientists, Writers, and Philosophers
Richard Dawkins: How a Scientist Changed the Way We Think: Reflections by Scientists, Writers, and Philosophers
"A vivid picture of how one man, by force of rigorous analysis and clear writing, taught a generation of biologists how to think about evolution."--New York Times

ith the publication of the international bestseller The Selfish Gene some thirty years ago, Richard Dawkins powerfully captured a newly emerging way of
...
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...

Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...
Software Engineering for Self-Adaptive Systems (Lecture Notes in Computer Science / Programming and Software Engineering)
Software Engineering for Self-Adaptive Systems (Lecture Notes in Computer Science / Programming and Software Engineering)
Although the self-adaptability of systems has been studied in a wide range of disciplines, from biology to robotics, only recently has the software engineering community recognized its key role in enabling the development of future software systems that are able to self-adapt to changes that may occur in the system, its requirements, or the...
Multi-Agent Programming:: Languages, Tools and Applications (Multiagent Systems, Artificial Societies, and Simulated Orga)
Multi-Agent Programming:: Languages, Tools and Applications (Multiagent Systems, Artificial Societies, and Simulated Orga)
Multi-Agent Systems are a promising technology to develop the next generation open distributed complex software systems. The main focus of the research community has been on the development of concepts (concerning both mental and social attitudes), architectures, techniques, and general approaches to the analysis and specification of multi-agent...
Principles and Models of Biological Transport
Principles and Models of Biological Transport
Transport processes are ubiquitous in the living organism, underlying nerve conduction and muscle contraction, digestion, kidney function and the nourishment of every cell in the body. The mechanisms by which these processes take place, and the models that describe them, are the subject of Principles and Models of Biological Transport,...
Professional Microsoft SQL Server 2008 Reporting Services (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2008 Reporting Services (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2008 Reporting Services

SQL Server Reporting Services makes reporting faster and easier than ever. This hands-on guide will show you how to harness the full power of Reporting Services to create reporting and business intelligence solutions that meet your company's needs. It walks...

Embedded Linux Development Using Eclipse
Embedded Linux Development Using Eclipse
Doug Abbott examines Eclipse and its ability to save time and money while designing and developing an embedded system!

The Eclipse environment solves the problem of having to maintain your own Integrated Development Environment (IDE), which is time consuming and costly. Embedded tools can also be easily integrated into
...
Character Animation with Poser Pro (Graphics Series)
Character Animation with Poser Pro (Graphics Series)
Discover how to bring your Poser characters to life with the latest version of Poser, the powerful 3D figure design software. "Character Animation with Poser Pro" shows animators, graphic artists, and game developers how to create high-quality, animated 3D characters, applying the fundamental principles and basic techniques of character...
Robotic Mapping and Exploration (Springer Tracts in Advanced Robotics)
Robotic Mapping and Exploration (Springer Tracts in Advanced Robotics)
"Robotic Mapping and Exploration" is an important contribution in the area of simultaneous localization and mapping  (SLAM) for autonomous robots, which has been receiving a great deal of attention by the research community in the latest few years. The contents are focused on the autonomous mapping learning problem. Solutions...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
Result Page: 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy