Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Essential Guide to HTML5
The Essential Guide to HTML5

HTML5 opens up a plethora of new avenues for application and game development on the web. Games can now be created and interacted with directly within HTML with no need for users to download extra plugins, or for developers to learn new languages. Important new features such as the Canvas tag enable drawing directly onto the web page, the...

Producing Flash CS3 Video: Techniques for Video Pros and Web Designers
Producing Flash CS3 Video: Techniques for Video Pros and Web Designers

Design and develop video applications with Flash Professional CS3. In quick primer chapters, you'll get the best practices for shooting video for Flash distribution and the basics of how to design Flash applications for compelling user experiences. Subsequent chapters demonstrate the integrated use of Flash Professional with Dreamweaver,...

Sap on DB2 for Z/OS and Os/390: High Availability and Performance Monitoring With Data Sharing
Sap on DB2 for Z/OS and Os/390: High Availability and Performance Monitoring With Data Sharing

This IBM Redbook addresses the challenges posed by monitoring high availability, scalability, and performance in an SAP sysplex data sharing environment. It introduces the motivations for utilizing a design based on DB2 data sharing. It includes the principal SAP-DB2 data sharing architecture options and trade-offs used in the industry today and...

OpenSolaris Bible
OpenSolaris Bible
After a beginning overview of the history of OpenSolaris, its open-source licensing, and the community development model, this book then goes on to highlight the aspects of OpenSolaris that differ from more familiar operating systems. You’ll learn how to become a power user of OpenSolaris by maximizing the abilities of advanced features like...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Carpenter's Complete Guide to the SAS Macro Language, 2nd Edition
Carpenter's Complete Guide to the SAS Macro Language, 2nd Edition

Art Carpenter thoroughly updates his successful first edition with an extensive collection of new examples and techniques. Addressing the composition and operation of the SAS macro facility and the SAS macro language, Carpenter's Complete Guide to the SAS Macro Language, Second Edition, is filled with ready-to-use macros, macro functions,...

Java Reflection in Action
Java Reflection in Action
Computing Review
"Well-written . . . presents a difficult topic in a clear and comprehensible fashion."

JavaRanch.com
"Exceptional coverage of an area . . . that is generally poorly covered and often misunderstood."

...
Simula Research Laboratory: by Thinking Constantly about it
Simula Research Laboratory: by Thinking Constantly about it

The Simula Research Laboratory, located just outside Oslo in Norway, is rightly famed as a highly successful research facility, despite being, at only eight years old, a very young institution. This fascinating book tells the history of Simula, detailing the culture and values that have been the guiding principles of the laboratory throughout...

Defeating the Hacker: A non-technical guide to computer security
Defeating the Hacker: A non-technical guide to computer security
This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage...
Sustainable On-Site CHP Systems: Design, Construction, and Operations
Sustainable On-Site CHP Systems: Design, Construction, and Operations

PROVEN TECHNIQUES FOR REDUCING ENERGY USE WITH CHP SYSTEMS

Plan, design, construct, and operate a sustainable on-site CHP (combined heat and power) facility using the detailed information in this practical guide. Sustainable On-Site CHP Systems reveals how to substantially increase the energy efficiency in commercial,...

Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
The celebration welcoming the second half of the 21st century on 31 December 2050 was subdued in the Persian Gulf. The major cities of Saudi Arabia, Kuwait, and others were dark. No fireworks or other signs of jubilation. Even those among them who had diversified their economies by investing in tourism, technology parks,...
Handbook of Chemical and Biological Warfare Agents
Handbook of Chemical and Biological Warfare Agents
With terrorist groups expanding their weapons of destruction beyond bombs and bullets, chemical and biological warfare agents aren't merely limited to the battlefield anymore. In some cases, they are now being used on a new front: major metropolitan cities. And in the Handbook of Chemical and Biological Warfare Agents, emergency response...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy