Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Decompiling Java
Decompiling Java
WHEN COREL BOUGHT WordPerfect for almost $200 million from the Novell Corporation in the mid 1990s, nobody would have thought that in a matter of months they would have been giving away the source code free. However, when Corel ported WordPerfect to Java and released it as a beta product, a simple program called Mocha1 could...
The AI Business: The Commercial Uses of Artificial Intelligence
The AI Business: The Commercial Uses of Artificial Intelligence

What is the bottom line on Artificial Intelligence? The AI Business offers a comprehensive summary of the commercial picture, present and future, for Artificial Intelligence in the computer industry, medicine, the oil industry, and electronic design. AI's brightest and best - financiers, researchers, and users - analyze current...

SQL: The Complete Reference, Second Edition
SQL: The Complete Reference, Second Edition
The Most Comprehensive SQL Resource Available

Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use...

Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
Industrial Project Management: Planning, Design, and Construction
Industrial Project Management: Planning, Design, and Construction
This book describes, in a precise but practical way, the most recent principles and techniques of project management, at the highest international standards, with a fully company-wide, process-based, multi-project approach.

It is unique because of the integration of project management fundamentals with the practices of international...

Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Natural Language Processing with Python
Natural Language Processing with Python
This book offers a highly accessible introduction to Natural Language Processing, the field that underpins a variety of language technologies, ranging from predictive text and email filtering to automatic summarization and translation. With Natural Language Processing with Python, you'll learn how to write Python programs to work with large...
Korn Shell Programming by Example
Korn Shell Programming by Example
Korn Shell Programming by Example is a straight-forward, nuts and bolts book that will become a standard in the libraries of Unix administrators everywhere because of its real-life examples, progressive style, and lack of unnecessary fluff. Based on the Korn shell, it is an essential reference for administrators on how to program their system, and...
Real Process Improvement Using the CMMI
Real Process Improvement Using the CMMI
This book offers non-academic, real-world approaches to implementing CMMI-based process improvement in an organization. The author identifies critical concepts of CMMI, and details how to turn them into real process improvement.

Real Process Improvement Using the CMMI provides real-world concepts and techniques for CMMI-based...

Result Page: 47 46 45 44 43 42 41 40 39 38 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy