Home | Amazing | Today | Tags | Publishers | Years | Search 
C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

LabVIEW for Engineers
LabVIEW for Engineers

In the past, LabVIEW was just a graphical programming language that was developed to make it easier to collect data from laboratory instruments using data acquisition systems. LabVIEW was always easy to use once you got used to wiring connectors to write your computer programs, and it definitely makes data acquisition an easier task...

Magento 1.4 Theming Cookbook
Magento 1.4 Theming Cookbook

Welcome dear reader to this Magento theming book. In this book, we are going to discover how to modify or create Magento themes from scratch. As you are reading this book, I assume you already know how great a tool this open source solution is. Though we will go through some of the basics, like installing and some theoretical concepts,...

Multimodal Usability (Human-Computer Interaction Series)
Multimodal Usability (Human-Computer Interaction Series)

This preface tells the story of how Multimodal Usability responds to a special challenge. Chapter 1 describes the goals and structure of this book.

The idea of describing how to make multimodal computer systems usable arose in the European Network of Excellence SIMILAR – “Taskforce for creating human-machine...

Kohana 3.0 Beginner's Guide
Kohana 3.0 Beginner's Guide

The Kohana framework for PHP 5 is a robust library for rapidly creating applications. No previous experience with Kohana, CodeIgniter, or MVC frameworks is assumed or needed to understand and use this book, and any previous experience will only assist you as we learn the Kohana framework from the ground up.

This book follows the...

Harley Hahn's Guide to Unix and Linux
Harley Hahn's Guide to Unix and Linux

The objective of AutoCAD 2010 Instructor is to provide you the best possible printed medium for learning AutoCAD, whether you are a professional or student learning AutoCAD on your own or whether you are attending an instructor-led course.

"Harley Hahn's Guide to Unix and Linux" is a modern, comprehensive text for...

Representation and Inference for Natural Language: A First Course in Computational Semantics
Representation and Inference for Natural Language: A First Course in Computational Semantics

This book developed out of courses on computational semantics that the authors jointly taught at the Department of Computational Linguistics, University of the Saarland, Saarbrucken, Germany, in 1995 and 1998, and at ESSLLI'97, the 9th European Summer School in Logic, Language and Information, Aix-en-Provence, France, in...

Microsoft Windows 7: Comprehensive (Shelly Cashman)
Microsoft Windows 7: Comprehensive (Shelly Cashman)

The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our Microsoft Windows 3.1, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows XP, and Microsoft Windows Vista books have been so well received by students and instructors. With each new...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Flash Development for Android Cookbook
Flash Development for Android Cookbook

It's taken a few years, but mobile and devices are finally hot. How hot? Like biting into a freshly ripe, raw, Habanero chili kind-a-HOT. Can you taste the virtual heat on your virtual tongue yet?

Yowza! The point I'm trying to get across is this. The broader mobile and device industry has finally gone mainstream. Why...

Result Page: 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy