 |
|
 The Book of Weeds: How to Deal with Plants that Behave Badly
Finally, from the author of Compost, fascinating information and advice on handling weeds - how to recognize them, how to control them, and how to exploit them. The first step is to know your enemy, so weeds are identified and the survival strategies of various types is explained to enable you to get rid of them more easily. Finally,... |  |  BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... |  |  Data Management and Query Processing in Semantic Web Databases
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which... |
|
 Alice 3 Cookbook
Alice is a free and innovative 3D programming environment that makes it easy to create an animation for telling a story, playing an interactive game, or a video to share on the Web. Alice is a teaching tool designed as a revolutionary approach to teaching and learning introductory programming concepts.
Alice 3 Cookbook focuses on... |  |  Experience and Knowledge Management in Software Engineering
Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific... |  |  The Compiler Design Handbook: Optimizations & Machine Code Generation
In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for... |
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |