Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creating iOS 5 Apps: Develop and Design
Creating iOS 5 Apps: Develop and Design
This book serves two goals: introducing new developers to iOS development, and educating experienced developers about the tools and technologies available in iOS 5. We will examine a wide range of subjects—some new and some old—covering everything from building an initial iOS project to submitting your app to the iTunes...
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Joomla! Templates (Joomla! Press)
Joomla! Templates (Joomla! Press)

Joomla! is one of the best known Open Source content management systems with many hundreds of thousands of applications in the most varied areas of use. It offers the best possible conditions for implementing a comprehensive and accessible Web presence. Thousands of extensions for almost any purpose are freely available. The developer and...

Coach Yourself to Win: 7 Steps to Breakthrough Performance on the Job and In Your Life
Coach Yourself to Win: 7 Steps to Breakthrough Performance on the Job and In Your Life

A proven process for changing the way you behave--used by a renowned executive coach for more than 25 years

Are you able, ready, and willing to permanently change your behavior?

Permanently replacing deeply ingrained behaviors with new ones is one of the hardest challenges to overcome. But in Coach Yourself...

Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

C Recipes: A Problem-Solution Approach
C Recipes: A Problem-Solution Approach
This book contains good number of C “recipes” for readers at all levels, from beginning to advanced. This book follows a problem-solution approach so that you can quickly find the solution to a desired problem. Every solution comes with suitable code and a brief discussion of that code. An attempt has been...
Macromedia Fireworks MX: Training from the Source
Macromedia Fireworks MX: Training from the Source
For expert, Macromedia-certified training on how to use Macromedia Fireworks MX to create Web pages, you'll want to head straight to the source. Macromedia Fireworks MX: Training from the Source includes 12 lessons and 16 hours of instruction designed to show you, step-by-step, how to create a Web site in Macromedia Fireworks MX. Over the course of...
Web Engineering: Principles and Techniques
Web Engineering: Principles and Techniques
Since the advent of the Web, every aspect of our lives and organizational activities has changed dramatically. Organizations’ expectations and dependencies on the use of Web technologies have increased rapidly over the years. Most organizations have conceived these Web technologies as a critical instrument for enhancing their performance;...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Taming Java Threads
Taming Java Threads

Learning how to write multithreaded applications is the key to taking full advantage of the Java platform. In Taming Java Threads, well-known columnist and Java expert Allen Holub provides Java programmers with the information they need to write real multithreaded programs--programs with real code. Holub provides an in-depth explanation...

Microsoft  Visual Web Developer(TM) 2005 Express Edition: Build a Web Site Now!
Microsoft Visual Web Developer(TM) 2005 Express Edition: Build a Web Site Now!
With this lively, eye-opening, and hands-on book, all you need is a computer and the desire to learn how to create Web pages now using Visual Web Developer Express Edition! Featuring a full working edition of the software, this fun and highly visual guide walks you through a complete Web page project from set-up to launch. Youll get an introduction...
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner introduces the readers to data mining using SAS Enterprise Miner v4. This book will reveal the power and ease of use of the powerful new module in SAS that will introduce the readers to the various configuration settings and subsequent results that are generated from the various nodes in Enterprise Miner that...
unlimited object storage image
Result Page: 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy