Home | Amazing | Today | Tags | Publishers | Years | Search 
PC Annoyances, Second Edition
PC Annoyances, Second Edition
In every PC user's life, there's a point when desperate measures must be taken. Some push their PC off a pier or chuck it into a landfill. Others turn their former computing ally into a planter box. But don't give up on your PC yet--help is at hand. This easy to read, accessible book from PC World expert Steve Bass covers the waterfront of...
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
Delphi in a Nutshell
Delphi in a Nutshell

Aimed at the working Delphi developer, Delphi in a Nutshell is an effective desktop reference to this popular programming tool. Besides listing all core classes and methods, this book also provides a host of expert dos and don'ts for mastering the newest features in Delphi's Object Pascal.

The heart of this book is...

Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering...
ASP.NET Bible
ASP.NET Bible
The Internet revolution of the late 1990s represented a dramatic shift in the way
individuals and organizations communicate with each other. Traditional applications,
such as word processors and accounting packages, are modeled as stand-alone
applications: they offer users the capability to perform tasks using data stored on the...
Data Munging with Perl
Data Munging with Perl
Over the last five years there has been an explosion of interest in Perl. This is largely because of the huge boost that Perl received when it was adopted as the de facto language for creating content on the World Wide Web. Perl’s powerful text manipulation facilities made it an obvious choice for writing Common Gateway Interface (CGI)...
Java 2 Micro Edition
Java 2 Micro Edition
Java 2 Micro Edition (J2ME) is a technology defined by many specifications. These specifications help J2ME address the diverse needs of this wide spectrum of consumer products. This guide describes the architecture of J2ME and demonstrates the various specifications for programming Java applications. Through the use of a tutorial application...
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
An absolute gem of a reference guide, Cisco TCP/IP Routing Professional Reference brings the empyreal realm of routers and protocols solidly to earth. The author provides excellent analogies coupled with practical tips, making this book suitable for those new to the strange terrain of Cisco routers and TCP/IP networking as well as for the...
19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

Advances in Evolutionary Algorithms: Theory, Design and Practice
Advances in Evolutionary Algorithms: Theory, Design and Practice
The goal of this book is to develop efficient optimization algorithms to solve diverse real-world problems of graded difficulty. Genetic and evolutionary mechanisms have been deployed for reaching the goal.

This book has made five significant contributions in the realm of genetic and evolutionary computation (GEC).

Practical
...
JSP Tag Libraries
JSP Tag Libraries
Shows HTML and Java programmers how to create and use JSP tag components to perform iterations and access databases, and manipulate EJB's, e-mail systems, Java Beans, and e-commerce applications and WAP that work with cellular phones.

Six years ago, Java burst onto the computing scene and dramatically changed the way programmers develop
...
Socially Intelligent Agents - Creating Relationships with Computers and Robots
Socially Intelligent Agents - Creating Relationships with Computers and Robots
The field of Socially Intelligent Agents (SIA) is a fast growing and increasingly important area that comprises highly active research activities and strongly interdisciplinary approaches. Socially Intelligent Agents, edited by Kerstin Dautenhahn, Alan Bond, Lola Canamero and Bruce Edmonds, emerged from the AAAI Symposium "Socially Intelligent...
Result Page: 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy