|
|
|
|
User Interface Design for Mere Mortals(TM)The growth of personal computing in the past two decades of the 20th century put a new emphasis on user interface design. As part of user interface design, companies began to focus on the usability of a product. The term usability has its roots in the 14th century, but as computing technology became prevalent in the 1980s, the definition... | | Visual Basic 2005 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)Attempting to learn all there is to know about developing VB .NET applications using the Microsoft .NET Framework would be an incredibly daunting task. For most of us, the easiest and best approach is to dive in and start writing code. We learn through testing and experimentation, and when we run into the unknown, we search the Internet or grab a... | | 3D Programming for Windows (Pro - Developer)The Windows Presentation Foundation is a key component of .NET Framework 3.0, which is a part of Windows Vista and available for Windows XP. With the Windows Presentation Foundation, 3D images can be displayed regardless of the video-display hardware on the users machine. Focusing on developing user interface objects or simple animations, this book... |
|
Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... | | | | Signals and Boundaries: Building Blocks for Complex Adaptive Systems
Complex adaptive systems (cas), including ecosystems, governments, biological cells, and markets, are characterized by intricate hierarchical arrangements of boundaries and signals. In ecosystems, for example, niches act as semi-permeable boundaries, and smells and visual patterns serve as signals; governments have departmental hierarchies... |
|
|
J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... | | Open Source Development with CVSThe need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.
The best available compromise is the concurrent versioning system... | | |
|
|
Result Page: 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 |