 |
|
|
|
 JSF 1.2 ComponentsThis book is a practical, hands-on guide to learning JavaServer Faces components based on a fictitious computer hardware e-commerce application. It adopts an example-driven approach focused on solving common web application development tasks using a wide range of JSF components from today's most popular JSF component libraries. Each chapter covers... |  |  Blender 3D 2.49 Incredible MachinesBlender 3D provides all the features you need to create super-realistic 3D models of machines for use in artwork, movies, and computer games. Blender 3D 2.49 Incredible Machines gives you step-by-step instructions for building weapons, vehicles, robots, and more.
This book will show you how to use Blender 3D for mechanical modeling and... |  |  |
|
 Data Mining: Special Issue in Annals of Information SystemsOver the course of the last twenty years, research in data mining has seen a substantial increase in interest, attracting original contributions from various disciplines including computer science, statistics, operations research, and information systems. Data mining supports a wide range of applications, from medical decision making,... |  |  Photoshop CS4 QuickStepsYour full-color, fast reference to Photoshop CS4
In this thoroughly revised guide, full-color screenshots and brief instructions show you how to use the latest version of Photoshop quickly and easily. Learn how to edit and retouch photos,... |  |  Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been... |
|
| Result Page: 625 624 623 622 621 620 619 618 617 616 615 614 613 612 611 610 609 608 607 |