 |
|
|
 Joomla! For Dummies (Computer/Tech)
Joomla (the exclamation point Joomla! won’t be used in the text of this
book, for the sake of making it more readable,) gives you total control of
your Web site — the layout, the navigation menus, the text, everything. In
turn, this book gives you total control of Joomla.
Today, users are demanding more from Web... |  |  Introducing Character Animation with Blender
It’s been five years since the first edition of Introducing Character Animation with Blender came out, and a lot has changed in the world of Blender. Interest in Blender has exploded. When the first edition of this book came out, it was the only English-language book on Blender in print. Now, as this second edition of the book arrives,... |  |  Scientific Data Mining and Knowledge Discovery: Principles and Foundations
This book suits both graduate students and researchers with a focus on discovering
knowledge from scientific data. The use of computational power for data analysis
and knowledge discovery in scientific disciplines has found its roots with the revolution
of high-performance computing systems. Computational science in physics,... |
|
 Apache Solr 3.1 Cookbook
Welcome to the Solr cookbook. You will be taken on a tour through the most common problems when dealing with Apache Solr. You will learn how to deal with the problems with Solr configuration and setup, how to handle common querying problems, how to fine-tune Solr instances, how to write Solr extensions, and many more things. Every recipe is... |  |  Oracle ADF Enterprise Application Development - Made Simple
Welcome to your first real-life enterprise ADF application!
The book you are holding in your hands is about building serious applications
with Oracle Application Development Framework (ADF). You know that actual
development work is only one part of a successful project, and that you also need
structure, processes, and tools.
... |  |  Cisco Firewalls (Networking Technology: Security)
Networks today have outgrown exponentially both in size and complexity, becoming
more multifaceted and increasingly challenging to secure. The blueprint of a core network
requires a strong foundation, which can be simply provided with an integrated firewall
architecture cemented at the core of the system. Today, the firewall has become... |
|
|
| Result Page: 423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 |