Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Android Projects (Books for Professionals by Professionals)
Practical Android Projects (Books for Professionals by Professionals)

Take a practical approach to becoming a leading-edge Android developer, learning by example while combining the many technologies needed to create a successful, up-to-date web app.
 
Practical Android Projects introduces the Android software development kit and development tools of the trade, and then
...

Implementation and Application of Automata: 15th International Conference, CIAA 2010
Implementation and Application of Automata: 15th International Conference, CIAA 2010

This volume of Lecture Notes in Computer Science contains revised versions of papers presented at the 15th International Conference on Implementation and Application of Automata, CIAA 2010. The conference was held at the University of Manitoba in Winnipeg, Canada, on August 12–15, 2010. The previous CIAA conferences were held in London,...

Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is...

Professional Windows Phone 7 Game Development: Creating Games using XNA Game Studio 4
Professional Windows Phone 7 Game Development: Creating Games using XNA Game Studio 4

THE PURPOSE OF THIS BOOK is to get you up to speed and excited about making games for Windows Phone 7 with XNA Game Studio 4.0.

Throughout the book, Windows and Xbox 360 game development are mentioned within the context of the material presented. But make no mistake — this is a book about Windows Phone 7, fi rst and...

Network Your Computers & Devices Step by Step
Network Your Computers & Devices Step by Step

In a modern home, it is no longer unusual for family members to own multiple computers and network devices. In most houses, you can find at least a desktop computer, which is generally used for more performance-intensive tasks such as gaming or professional work of any kind. Parents bring home their work laptops or notebooks, which they...

Microsoft Access 2010 VBA Macro Programming
Microsoft Access 2010 VBA Macro Programming

Database macro programming has changed enormously over the last 15 years, having gone from Access Basic macros to VBA. Another major change occurred with Office 95, when macros went to VBA modules in a separate environment accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special design window....

Joomla! 1.6: A User's Guide: Building a Successful Joomla! Powered Website (3rd Edition)
Joomla! 1.6: A User's Guide: Building a Successful Joomla! Powered Website (3rd Edition)

Joomla is an open source content management system (CMS) that anyone can download for free (see forge.joomla.org/sf/go/projects.joomla/frs). This makes it an ideal choice for small businesses. Don’t let the price tag fool you, though; Joomla is powerful and robust, and more big organizations are choosing to use open source software...

Exchange Server 2010 Administration: Real World Skills for MCITP Certification and Beyond
Exchange Server 2010 Administration: Real World Skills for MCITP Certification and Beyond

Over the years, Exchange Server has become a complicated messaging solution that many organizations rely on. Many companies have not upgraded to Exchange Server 2007 and are still using Exchange Server 2003. With the release of Exchange Server 2010, they are now contemplating upgrading to take advantage of this new version’s...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

Designing Solutions for Microsoft SharePoint 2010: Making the right architecture and implementation decisions
Designing Solutions for Microsoft SharePoint 2010: Making the right architecture and implementation decisions

Microsoft® SharePoint® 2010 is the fourth incarnation of the popular collaboration and content management platform from Microsoft. With each release, the reach and capabilities of SharePoint products and technologies have grown, offering new tools to organizations and new opportunities to developers. With SharePoint 2010, you...

Successful Project Management: Applying Best Practices and Real-World Techniques with Microsoft Project
Successful Project Management: Applying Best Practices and Real-World Techniques with Microsoft Project

Projec t manageme nt has been around for centuries. After all, how do you think the Pyramids were built? Organizations have come to recognize that a lot of the work they do is project-oriented. And when they realize that good project management can save both time and money, that’s about the time that people like you receive the...

Result Page: 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy