Remote sensing stands as the defining technology in our ability to monitor coral reefs, as well as their biophysical properties and associated processes, at regional to global scales. With overwhelming evidence that much of Earth’s reefs are in decline, our need for large-scale, repeatable assessments of reefs has never been so great....
Learn to use the power of Pentaho for Business Intelligence reporting in a series of simple, logical stages. From installation in Windows or Linux right through to publishing your own Java web application, it's all here.
Microsoft Visual Basic developers have long clamored for complete objectoriented language support. Microsoft Visual Basic .NET supports all the features of an objectoriented language. In addition, the entire Microsoft .NET Framework, which includes the development support for Microsoft Windows applications, Web applications, Web ...
Java's growth over the last 10 years has been nothing short of phenomenal. Given Java's rapid rise to prominence and the even more spectacular growth of the Internet, it's a little surprising that network programming in Java is still so mysterious to so many. It doesn't have to be. In fact, writing network programs in Java...
These are powerful, flexible, and complex tools, and most Excel users never tap their full potential. But you can, with Peter Aitken's step-by-step tutorials, understandable instructions, and detailed explanations. You'll learn to create and use PivotTables and charts from the simplest to the most complex.
Benjamin Crowell, in "The Assayer", book reviews and discussion for the free-information renaissance ...There's ... emphasis on teaching computer science not just as a technical trade but as a mental discipline.
A key resource to learn how to repurpose Windows applications for handheld devices
When handheld computers were power-hungry and memory-poor, synchronizing calendars and perhaps reading e-mail were all the applications most people needed. Now that handhelds have more power than first-generation desktop computers, the opportunity to do more than...
This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...