 |
|
 HTML, XHTML, and CSS: Comprehensive (Shelly Cashman)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are
proud of the fact that our previous HTML books have been so well received. With each
new edition of our HTML books, we have made signifi cant improvements based on the
comments made by instructors and students. The HTML, XHTML, and CSS, Sixth... |  |  |  |  Multimedia Systems: Algorithms, Standards, and Industry Practices
Multimedia is now a broad “umbrella” that innovatively combines different fields of
research and industry to produce practical solutions that are used on a wide scale
today. Some of these fields are signal processing, imaging and color science, video and
audio analysis, 2D/3D graphics, information theory, compression,... |
|
 Human-in-the-Loop Simulations: Methods and Practice
Both the editors of this book were exposed to human-in-the-loop simulations while
pursuing their doctoral degrees in the Center for Human-Machine Systems at
Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant
for the simulation course taught by Prof. Christine Mitchell. It has been over 15
years... |  |  New Perspectives on Microsoft Excel 2010: Brief (New Perspectives)
The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way
to prepare students to transcend point-and-click skills and take advantage of all that
Microsoft Office 2010 has to offer.
In developing the New Perspectives Series, our goal was to create books that give students
the software... |  |  C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design requires no previous introduction
to programming and only a mathematical background of high school algebra. The
book uses C# as the programming language for software development; however, the basic
programming concepts presented can be applied to a number of other languages.... |
|
 Microsoft Windows 7: Comprehensive (Shelly Cashman)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact
that our Microsoft Windows 3.1, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows
2000, Microsoft Windows XP, and Microsoft Windows Vista books have been so well received by students
and instructors. With each new... |  |  Kohana 3.0 Beginner's Guide
The Kohana framework for PHP 5 is a robust library for rapidly creating applications. No previous experience with Kohana, CodeIgniter, or MVC frameworks is assumed or needed to understand and use this book, and any previous experience will only assist you as we learn the Kohana framework from the ground up.
This book follows the... |  |  Harley Hahn's Guide to Unix and Linux
The objective of AutoCAD 2010 Instructor is to provide you the best possible printed medium for learning
AutoCAD, whether you are a professional or student learning AutoCAD on your own or whether you
are attending an instructor-led course.
"Harley Hahn's Guide to Unix and Linux" is a modern, comprehensive text for... |
|
 Representation and Inference for Natural Language: A First Course in Computational Semantics
This book developed out of courses on computational semantics that
the authors jointly taught at the Department of Computational Linguistics, University of the Saarland, Saarbrucken, Germany, in 1995 and
1998, and at ESSLLI'97, the 9th European Summer School in Logic,
Language and Information, Aix-en-Provence, France, in... |  |  Multimodal Usability (Human-Computer Interaction Series)
This preface tells the story of how Multimodal Usability responds to a special
challenge. Chapter 1 describes the goals and structure of this book.
The idea of describing how to make multimodal computer systems usable
arose in the European Network of Excellence SIMILAR – “Taskforce for creating
human-machine... |  |  Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
Result Page: 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 |