Home | Amazing | Today | Tags | Publishers | Years | Search 
SharePoint 2010 Development For Dummies
SharePoint 2010 Development For Dummies

In the last few years SharePoint has taken the world by storm. In fact, the product is one of the fastest growing products in the history of Microsoft. Companies of all sizes are rapidly implementing SharePoint and moving it to the center of their organization. The interesting thing about SharePoint, however, is that if you ask ten...

Desktop Witness: The Do's and Don'ts of Personal Computer Security
Desktop Witness: The Do's and Don'ts of Personal Computer Security

When asked 'who are you?', people in different cultures tend to define themselves fundamentally differently in terms of what their respective culture considers to be most important. In cultures where one's professional and economic status is most important, people say 'I am an engineer', or 'a priest at St...

Facebook Me! A Guide to Socializing, Sharing, and Promoting on Facebook (2nd Edition)
Facebook Me! A Guide to Socializing, Sharing, and Promoting on Facebook (2nd Edition)

With more than 500 million active users around the world and still growing steadily, Facebook is more than just another social media site. In the words of author Dave Awl, Facebook is “the new town square”—the place where people gather to discuss the news of the day as well as share what’s going on in their lives. And...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10
Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10

The 10th International Conference on Unconventional Computation, UC 2011, was organized under the auspices of EATCS and Academia Europaea, by the Department of Mathematics of the University of Turku (Turku, Finland), and the Center for Discrete Mathematics and Theoretical Computer Science (Auckland, New Zealand). The event was held in...

Korea's Online Gaming Empire
Korea's Online Gaming Empire

Too often I hear people say ‘ South Korea ’ and ‘ emerging market ’ in the same sentence, ” said Rich Wickham, the global head of Microsoft ’ s Windows games business. “ When it comes to gaming, Korea is the developed market, and it ’ s the rest of the world that ’ s playing...

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

The world of hacking is a world of pain and frustration. Frustration for the hacker as he tries to figure out how to break the latest and greatest security device, and pain for the manufacturer or corporation that made or was relying on that device.

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...

Object-Oriented Software Engineering: Practical Software Development using UML and Java
Object-Oriented Software Engineering: Practical Software Development using UML and Java

This earliest recorded attempt to regulate the engineering profession reminds us, in the bluntest way possible, that the paramount purpose of engineering and engineering design is to serve the user. One would assume that the engineer’s responsibility to users is so self evident that it goes without saying. Various professional...

Recent Trends and Developments in Social Software: International Conferences on Social Software
Recent Trends and Developments in Social Software: International Conferences on Social Software

From its beginnings, the Internet has fostered communication, collaboration and networking between users. However, the first boom at the turn of the millennium was mainly driven by a rather one-sided interaction: e-commerce, portal sites and the broadcast models of mainstream media were introduced to theWeb. Over the last six or seven...

Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television: 1964-2004 (5 Volume Set)
Movies Made for Television in 2004 celebrates 40 full television seasons. As I wrote in the introduction in 1980 to the original (single) volume that chronicled the genre, the range was as esthetically and technically wide at the time as it would remain through the years since as any theatrical offerings – within its restricted...
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy