Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning Flash Media Server 3
Learning Flash Media Server 3

If you're interested in recording and streaming media using Flash Media Server 3 (FMS3) and Adobe's Real-Time Messaging Protocol, this unique 267-page PDF-only book is the perfect primer. It is not a reference, but a systematic guide to developing FMS3 applications using ActionScript 3.0, with chapters that focus on specific...

Financial Risk Manager Handbook, Second Edition
Financial Risk Manager Handbook, Second Edition
A comprehensive reference and training guide for financial risk management

Risk professionals looking to earn the Financial Risk Manager (FRM™) certification, corporate training programs, professors, and graduate students all rely on one book for the most comprehensive and up-to-date information on financial risk management–the...

Ejb 3 Developer Guide
Ejb 3 Developer Guide
Enterprise JavaBeans (EJB) technology is a core part of the Java EE 5 specification. EJB is a framework for building enterprise-scale object-oriented, distributed, component-based business applications. EJB business applications are written in Java, are scalable and can be deployed on any platform that supports the EJB specification.

EJB
...
DotNetNuke Skinning Tutorial
DotNetNuke Skinning Tutorial
DotNetNuke is an open-source web application framework written in VB.NET for the ASP.NET framework. The application's content management system is extensible and customizable through the use of skins and modules, and it can be used to create, deploy, and manage intranet, extranet, and websites.

DotNetNuke has a skinning architecture
...
Learning VirtualDub
Learning VirtualDub
VirtualDub is one of the most popular video processing application for Windows. As an Open Source application, it's free, and is constantly updated and expanded by an active community of developers and experts. VirtualDub particularly popular for capturing video from analogue sources such as video tape, cleaning up the image and compressing it...
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Every year, organizations rely on Internet applications and services more deeply–and every year, Internet infrastructure grows more powerful and complex. As the limitations of traditional IPv4 addressing become increasingly apparent, many decision makers recognize that a transition to IPv6 is needed far sooner than anticipated. Global...
Advanced Dynamic-system Simulation: Model-replication Techniques and Monte Carlo Simulation
Advanced Dynamic-system Simulation: Model-replication Techniques and Monte Carlo Simulation
Simulation is experimentation with models. This book describes new computer programs for interactive modeling and simulation of dynamic systems, such as aerospace vehicles, control systems, and biological systems. Simulation studies for design or research can involve many hundreds of model changes, so programming must be convenient, and...
Structures of Participation in Digital Culture
Structures of Participation in Digital Culture
Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider...
The Conspirators Hierarchy: The Committee of Three Hundred
The Conspirators Hierarchy: The Committee of Three Hundred
Can you imagine an all powerful group, that knows no national boundaries, above the laws of all countries, one that controls every aspect of politics, religion, commerce and industry; banking, insurance, mining, the drug trade, the petroleum industry, a group answerable to no one but its members. To the vast majority of us, such a group would...
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

Mac OS X Hints, Leopard Edition - Macworld Superguide
Mac OS X Hints, Leopard Edition - Macworld Superguide
Unleash Leopard with 200+ tips and tricks

When it comes to uncovering your Mac's hidden powers, there's no better resource than MacOSXHints.com, a collaborative Web site that lets Mac users share their favorite tips and tricks.

In fact, over the past eight years, the site has collected more than...

Sams Teach Yourself Visual C# 2008 in 24 Hours: Complete Starter Kit
Sams Teach Yourself Visual C# 2008 in 24 Hours: Complete Starter Kit
In just 24 sessions of one hour or less, you will be up and running with Visual C# 2008. Using a straightforward, step-by-step approach, each lesson builds upon the previous one, allowing you to learn the essentials of Visual C# from the ground up.

 

By the Way notes...

Result Page: 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy