 |
|
 Innovative Tools for Business Coalitions in B2B Applications
One of the most debated consequences regarding the increased availability and use
of information and communication technologies (ICTs), especially since the early
1990s, have been their impact on economic growth. Generally speaking, ICT can
serve to reduce transaction costs at all levels of a commercial transaction. With the
emergence... |  |  Understanding Voice Over IP Technology
The technology of voice over IP provides for making telephone calls over data networks
such as the Internet and it has now reached critical mass. I know this because
as a technology instructor I spend more and more time teaching Voice over IP or
“VoIP.” I wrote this book because I couldn’t find any material suitable... |  |  The HCS12 / 9S12: An Introduction to Software and Hardware Interfacing
The Freescale HCS12 (also known as 9S12) microcontroller family was initially designed for
automotive applications. The design of the HCS12 combines most features common in major
8-bit and 16-bit microcontrollers.
1. Full-feature timer system. The HCS12 timer system provides input-capture, outputcompare,
pulse-width... |
|
 Microsoft Windows 7: Comprehensive (Shelly Cashman)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact
that our Microsoft Windows 3.1, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows
2000, Microsoft Windows XP, and Microsoft Windows Vista books have been so well received by students
and instructors. With each new... |  |  JavaScript Web Applications
JavaScript has come a long way from its humble beginnings in 1995 as part of the Netscape browser, to the high-performance JIT interpreters of today. Even just five years ago developers were blown away by Ajax and the yellow fade technique; now, complex JavaScript apps run into the hundreds of thousands of lines.
In the last year,... |  |  Representation and Inference for Natural Language: A First Course in Computational Semantics
This book developed out of courses on computational semantics that
the authors jointly taught at the Department of Computational Linguistics, University of the Saarland, Saarbrucken, Germany, in 1995 and
1998, and at ESSLLI'97, the 9th European Summer School in Logic,
Language and Information, Aix-en-Provence, France, in... |
|
|
 Java How to Program (early objects) (9th Edition) (Deitel)
Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.
The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of... |  |  Cryptography and Network Security: Principles and Practice (5th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |  |  C++ How to Program (8th Edition)
Welcome to the C++ computer programming language and C++ How to Program, Eighth
Edition! This book presents leading-edge computing technologies, and is particularly appropriate
for inroductory course sequences based on the curriculum recommendations of
two key professional organizations—the ACM and the IEEE.
The new... |
|
Result Page: 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 792 |