Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java I/O
Java I/O
Because it doesn't provide a printf() function like C/C++, some developers think Java isn't up to snuff with files and streams. Author Rusty Harold Elliotte argues against this notion in Java I/O, a book that shows how Java's stream support can help simplify network programming, internationalization, and even compression and...
The Debian System: Concepts and Techniques
The Debian System: Concepts and Techniques
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user interfaces (GUIs). Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development...
The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Model-Based Software Testing and Analysis with C#
Model-Based Software Testing and Analysis with C#
This book teaches new methods for specifying, analyzing, and testing software; essentials for creating high-quality software. These methods increase the automation in each of these steps, making them more timely, more thorough, and more effective. The authors work through several realistic case studies in-depth and detail, using a toolkit built on...
Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
This monograph deals with the description and design of digital images. Regarding digital images as special input/output relations in our previous book with LNCIS series, the description problem of digital images is transformed into the realization problem of digital images. From the data in digital images, mathematical models will be constructed....
Investment Banking: A Guide to Underwriting and Advisory Services
Investment Banking: A Guide to Underwriting and Advisory Services

The recent financial turmoil has raised suspects on investment banks and will certainly reshape the industry. However, the transactions traditionally managed by investment banks will still require the intervention of financial institutions, as always in the past. This book aims at providing an overview of these traditional investment banking...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

LiveCode Mobile Development Hotshot
LiveCode Mobile Development Hotshot

Create your own exciting applications with 10 fantastic projects

Overview

  • Create your own mobile games and apps using LiveCode
  • Develop user interfaces for mobile devices
  • Use databases and advanced features of LiveCode

In Detail

There are...

Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout
Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout

Hazardous energy present in systems, machines, and equipment has injured, maimed, and killed many workers. One serious injury can stop the growth of your business in its tracks. Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout provides the practical tools needed to assess hazardous energy in...

Energy Efficient Servers: Blueprints for Data Center Optimization
Energy Efficient Servers: Blueprints for Data Center Optimization

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

unlimited object storage image
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy