Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing Visual Interfaces: Communication Oriented Techniques
Designing Visual Interfaces: Communication Oriented Techniques
An excellent introduction to the design theories involved in the creation of user interfaces. Instead of the usual examples and pictures of computer screens and application menus, Mullet approaches the concept of UI from its "outside world" roots. With examples ranging from street signs to corporate logos to the map of the London...
Practical Guide to Using SQL in Oracle (Wordware Applications Library)
Practical Guide to Using SQL in Oracle (Wordware Applications Library)
Structured Query Language has become the standard for generating, manipulating, and retrieving database information. The dramatic increase in the popularity of relational databases, coupled with Oracle s having the largest market share, has created a demand for programmers who can write SQL code correctly and efficiently. This book provides a...
Android Application Development: Programming with the Google SDK
Android Application Development: Programming with the Google SDK
This practical book provides the concepts and code you need to develop software with Android, the open-source platform for cell phones and mobile devices that's generating enthusiasm across the industry. Based on the Linux operating system and developed by Google and the Open Handset Alliance, Android has the potential to unite a fragmented mobile...
Fires in Silos: Hazards, Prevention, and Fire Fighting
Fires in Silos: Hazards, Prevention, and Fire Fighting
Storage of chemicals in silos is ubiquitous in the chemical, pharmaceutical and other producing industries, and some 80 % of all bulk materials are inflammable. It is here that the risk of large fires arises due to self-ignition or the intrusion of different ignition sources. For firefighters, most silo fires are very difficult to handle due to the...
Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.

This book discusses the current and potential treatment technologies involved in
...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Grails 1.1 Web Application Development
Grails 1.1 Web Application Development
Web development is tricky--even a simple web application has a number of context changes ready to trip up the unwary. Grails takes the everyday pain out of web application development, allowing us to focus on delivering real application logic and create seamless experiences that will address the needs of our users. This book will take the pain out...
Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

JBoss Drools Business Rules
JBoss Drools Business Rules

In business, a lot of actions are trigged by rules: "Order more ice cream when the stock is below 100 units and temperature is above 25° C", "Approve credit card application when the credit background check is OK, past relationship with the customer is profitable, and identity is confirmed", and so on. Traditional...

Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
Scripting Intelligence: Web 3.0 Information, Gathering and Processing
Scripting Intelligence: Web 3.0 Information, Gathering and Processing
This book covers Web 3.0 technologies from a software developer’s point of view. While nontechies can use web services and portals that other people create, developers have the ability to be creators and consumers at the same time—by integrating their work with other people’s efforts.

The Meaning of Web 3.0
...
Result Page: 747 746 745 744 743 742 741 740 739 738 737 736 735 734 733 732 731 730 729 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy