Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to JasperReports (Expert's Voice)
The Definitive Guide to JasperReports (Expert's Voice)
JasperForge.org is the open source development portal for the JasperSoft Business Intelligence Suite, the JasperSoft Business Intelligence solution that delivers comprehensive tools for data access, data integration, analysis, and reporting, including JasperReports. This definitive, authoritative covers the following:
  • Shows the power...
Metaheuristics: Progress in Complex Systems Optimization (Operations Research/Computer Science Interfaces Series)
Metaheuristics: Progress in Complex Systems Optimization (Operations Research/Computer Science Interfaces Series)
Metaheuristics has grown and continues to grow steadily. Seen both from the technical point of view and from the application-oriented side, these optimization tools have established their value in a remarkable story of success. Researchers have demonstrated the ability of these methods to solve hard combinatorial problems of practical sizes within...
Software Engineering 2: Specification of Systems and Languages (Texts in Theoretical Computer Science. An EATCS Series)
Software Engineering 2: Specification of Systems and Languages (Texts in Theoretical Computer Science. An EATCS Series)
From the reviews:

"The present volume is the second one of a trilogy on formal development of large scale systems. Each topic is presented by means of many examples . The end of each chapter includes several exercises that demonstrate the topics in a more realistic setting. The quite large spectrum of modelling and specification...

Spatial Data on the Web: Modeling and Management
Spatial Data on the Web: Modeling and Management
Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on,...
IP over WDM: Building the Next Generation Optical Internet
IP over WDM: Building the Next Generation Optical Internet
The primary objective of this book is to provide, in an understandable style, comprehensive and practical information on the transport of the Internet protocol (IP) over the optical/wavelength-division-multiplexed (WDM) layer. This is accomplished by providing sufficient background information on the enabling technologies, followed by an in-depth...
Hacking Roomba: ExtremeTech
Hacking Roomba: ExtremeTech

The jetsons would be proud

A gizmo as cool as Roomba just begs to be hacked. Now, with this book and the official ROI specification furnished by iRobot®, you can become the robotic engineer you dreamed of being when you were 10. Build a Bluetooth interface for your Roomba. Turn it into an artist....

The Practical Use of Fracture Mechanics
The Practical Use of Fracture Mechanics
This book is about the use of fracture mechanics for the solution of practical problems; academic rigor is not at issue and dealt with only in as far as it improves insight and understanding; it often concerns secondary errors in engineering. Knowledge of (ignorance of) such basic input as loads and stresses in practical cases may cause errors far...
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This book contains initial results of innovative and sometimes controversial emerging Web services research ideas. It covers a wide spectrum of active research areas like Model Driven Engineering for SOA, Mobility and Services, Dynamic Web Service Discovery and Composition, Service Management, and Semantic Web, just to name a few.

As Web...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Essentials of Mathematica: With Applications to Mathematics and Physics
Essentials of Mathematica: With Applications to Mathematics and Physics
Essential Mathematica: With Applications to Mathematics and Physics, based on the lecture notes of a course taught at the University of Illinois at Chicago to advanced undergrad and graduate students, teaches how to use Mathematica to solve a wide variety problems in mathematics and physics. It is illustrated with many detailed examples that...
Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Genetic Programming Theory and Practice IV (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice IV (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice IV was developed from the fourth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Contributions from the foremost international...
Result Page: 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy