Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of X Programming: Graphical User Interfaces and Beyond
Fundamentals of X Programming: Graphical User Interfaces and Beyond
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets. We pay special attention to applications that go beyond graphical user interfaces (GUIs); therefore we discuss issues affecting video games, visualization and imaging programs,...
IBM Certification Study Guide Aix Communications
IBM Certification Study Guide Aix Communications
The AIX and RS/6000 certifications offered through the Professional Certification Program from IBM are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of AIX and RS/6000. A complete set of professional certifications are available. They include:
Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

DVD Demystified
DVD Demystified
"This is not merely ‘a’ good book to help you make sense of DVD, it is ‘the’ book that you will return to over and over as you explore and come to understand this exciting new optical media format." - Geoffrey Tully, Multimedia Technology Consultant; former Senior VP of Production, Divx Entertainment

DVD is...

Application Development Using C# and .NET
Application Development Using C# and .NET
Microsoft .NET is an advance in programming technology that greatly simplifies application development both for traditional, proprietary applications, and for the emerging paradigm of Web-based services. .NET is a complete restructuring of Microsoft's whole system infrastructure and represents a major learning challenge for programmers developing...
The Austin Protocol Compiler (Advances in Information Security)
The Austin Protocol Compiler (Advances in Information Security)

The TAP notation uses two types of semantics: an abstract semantics for protocol verifiers and a concrete semantics for protocol implementers. The Austin Protocol Compiler illustrates that two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the...

Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Knowledge means power – but only if it is available at the right time, the right place, and in the hands of the right people. Structured, engineered, repeatable methods to gather, transport, and apply knowledge are collectively called knowledge management.

Declarative programming strives for the ideal of programming by wish: the
...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Error Free Software: Know-How and Know-Why of Program Correctness (Wiley Series in Software Engineering Practice)
Error Free Software: Know-How and Know-Why of Program Correctness (Wiley Series in Software Engineering Practice)
This book is the result of an evolutionary process which took place over a number of years. The contents of this book are based on my seminar for experienced software developers, which I instruct internationally, andon courses which I have taught as an external lecturer in the Informatics Department of the Johann Wolfgang Goethe University in...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
New Computational Paradigms: Changing Conceptions of What is Computable
New Computational Paradigms: Changing Conceptions of What is Computable
In recent years, classical computability has expanded beyond its original scope to address issues related to computability and complexity in algebra, analysis, and physics. The deep interconnection between "computation" and "proof" has originated much of the most significant work in constructive mathematics and mathematical...
Best Websites for Financial Professionals, Business Appraisers, and Accountants, Second Edition
Best Websites for Financial Professionals, Business Appraisers, and Accountants, Second Edition
This book is aimed primarily at the accountant or financial analyst who is engaged in consulting work—such as business appraisal, financial planning, and management consulting. The consulting area is the most rapidly growing area of accounting practice, and financial professionals in this area can benefit significantly from the increase in...
unlimited object storage image
Result Page: 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy