Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Ajax and Java Frameworks
Pro Ajax and Java Frameworks

As a Java developer, you want a guide that shows you how to add Ajax functionality to your web applications with a minimum of effort. Well look no further than Pro Ajax and Java Frameworks. In this book, recognized Java experts and authors of the best-selling Apress title, Foundations of Ajax, will show you how.

The...

The Law, In Plain English, For Photographers
The Law, In Plain English, For Photographers
The photographer's definitive business and legal resource is now completely updated and expanded. In this valuable guide, arts attorney Leonard DuBoff takes you step by step though all the legal aspects of the photography business. Here is expert advice for everything from contracts to trademarks, including government licenses, taxes, censorship,...
The PC Doctor's Fix It Yourself Guide
The PC Doctor's Fix It Yourself Guide
If you are reading this, you probably have a computer. If I’m right and you do, then there’s a very good chance that it’s important to you, either personally or professionally, or both. Another thing I can safely assume is that you probably know what it feels like when your computer goes wrong.

Computers are all around
...
Hadoop Real World Solutions Cookbook
Hadoop Real World Solutions Cookbook

Ever felt you could use some no-nonsense, practical help when developing applications with Hadoop? Well, you've just found it. This real-world solutions cookbook is packed with handy recipes you can apply to your own everyday issues.

Overview

  • Solutions to common problems when working in the Hadoop...
Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. These are encountered in many critical areas of everyday life such as transportation networks, electric power distribution grids, and social networks of mobile users. STN modeling and computations raise significant challenges. The model must...
Palm OS Programming
Palm OS Programming
The PalmOS is the most widely-distributed operating system for handheld computers, with tens of millions of devices in use worldwide. Palm has a thriving developer community, with over 350,000 registered developers and countless hobbyist developers. The new edition of PalmOS Programming introduces the many updates to the PalmOS operating system...
Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Teaching with iPad How-to
Teaching with iPad How-to

Use your iPad creatively for everyday teaching tasks in schools and universities

Overview

  • Plan your lessons on iPad and share notes quickly
  • Use exclusive iPad 3D resources for more engaging learning.
  • Use your iPad for creating and giving presentations.

...

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
The Philosophy of Software: Code and Mediation in the Digital Age
The Philosophy of Software: Code and Mediation in the Digital Age
Writing remains to me an unusual practice that transforms my experience of the world whilst under the spell of writing. This book has had a particularly intensive birth, written as it is in the middle of the academic year and with everyday life swirling around it with all the attendant distractions. It has emerged from a number of related...
Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy