 |
|
 Joomla! For Dummies (Computer/Tech)
Joomla (the exclamation point Joomla! won’t be used in the text of this
book, for the sake of making it more readable,) gives you total control of
your Web site — the layout, the navigation menus, the text, everything. In
turn, this book gives you total control of Joomla.
Today, users are demanding more from Web... |  |  Grid and Cloud Database Management
Since the 1960s, database systems have been playing a relevant role in the
information technology field. By the mid-1960s, several systems were also available
for commercial purposes. Hierarchical and network database systems provided
two different perspectives and data models to organize data collections. In 1970,
E. Codd wrote a... |  |  Computability In Context: Computation and Logic in the Real World
Computability has played a crucial role in mathematics and computer science
– leading to the discovery, understanding and classification of decidable/
undecidable problems, paving the way to the modern computer era
and affecting deeply our view of the world. Recent new paradigms of computation,
based on biological and physical... |
|
 Building Robots with LEGO Mindstorms NXT
LEGO has been a part of my life since I was about four years old. My first sets were basic
LEGO SYSTEM sets. However, I soon lumped to the early TECHNIC sets that were
beginning to appear on the market. Because I was one of those kids who had to take everything
apart to figure out how it worked, TECHNIC seemed like a good fit for me.... |  |  Any Time, Anywhere Computing: Mobile Computing Concepts and Technology
Mobile communications have permeated the globe in both business and social
cultures. In only a few short years, Japan alone has had more than ten million
subscribers enter the mobile market. Such explosive popularity is an indication
of a strong commercial demand for communications in both the tethered and
tetherless environments. ... |  |  Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the... |
|
 Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,... |  |  Pro HTML5 Programming (Professional Apress)
This book is about HTML5 Programming. Before you can understand HTML5 programming, however, you need to take a step back and understand what HTML5 is, a bit of the history behind it, and the differences between HTML 4 and HTML5.
In this chapter, we get right to the practical questions to which everyone wants answers. Why... |  |  Agent-based Ubiquitous Computing (Atlantis Ambient and Pervasive Intelligence)
Ubiquitous computing names the third wave in computing, where the personal computing
era appears when technology recedes into the background of our lives. The widespread use
of new mobile technology implementing wireless communications such as personal digital
assistants (PDAs) and smart phones enables a new type of advanced... |
|
|
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 |