Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dynamic Web Programming and HTML5
Dynamic Web Programming and HTML5

With organizations and individuals increasingly dependent on the Web, the need for competent, well-trained Web developers and maintainers is growing. Helping readers master Web development, Dynamic Web Programming and HTML5 covers specific Web programming languages, APIs, and coding techniques and provides an...

Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
This book presents new findings on cyber-physical systems design and modelling approaches based on AI and data-driven techniques, identifying the key industrial challenges and the main features of design and modelling processes. To enhance the efficiency of the design process, it proposes new approaches based on the concept of digital twins....
Building Client/Server Applications with VB.NET: An Example-Driven Approach
Building Client/Server Applications with VB.NET: An Example-Driven Approach

Building Client/Server Applications with VB .NET: An Example-Driven Approach is based on Release 1.0 of the .NET Framework / Release 1.0 of Visual Studio .NET + .NET Framework Service Pack 1. Jeff Levinson walks readers through how to write a complete application-no "snippets" of code- and will show readers examples of...

Enterprise JavaBeans (3rd Edition)
Enterprise JavaBeans (3rd Edition)
EnterpriseJavaBeans, 3rd edition, has been thoroughly revised to include complete coverage of three major changes in the EJB 2.0 specification: A new version of container-managed persistence; local interfaces; and a totally new kind of bean called the "message driven bean." The 3rd edition...
Innovations in Machine Learning: Theory and Applications (Studies in Fuzziness and Soft Computing)
Innovations in Machine Learning: Theory and Applications (Studies in Fuzziness and Soft Computing)
The study of innovation – the development of new knowledge and artifacts – is of interest to scientists and practitioners. Innovations change the day-to-day lives of individuals, transform economies, and even create new societies. The conditions triggering innovation and the innovation process itself set the stage for economic...
Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Questioning the Veil: Open Letters to Muslim Women
Questioning the Veil: Open Letters to Muslim Women

Across much of the world today, Muslim women of all ages are increasingly turning to wearing the veil. Is this trend a sign of rising piety or a way of asserting Muslim pride? And does the veil really provide women freedom from sexual harassment? Written in the form of letters addressing all those interested in this issue, Questioning the...

The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)
Bioinformatics: The Machine Learning Approach, Second Edition (Adaptive Computation and Machine Learning)

We have been very pleased, beyond our expectations, with the reception of the first edition of this book. Bioinformatics, however, continues to evolve very rapidly, hence the need for a new edition. In the past three years, fullgenome sequencing has blossomed with the completion of the sequence of the fly and the first draft of the...

unlimited object storage image
Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 192 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy