Home | Amazing | Today | Tags | Publishers | Years | Search 
Java(TM) Programming: From Problem Analysis to Program Design
Java(TM) Programming: From Problem Analysis to Program Design

Welcome to Java Programming: From Problem Analysis to Program Design, Fifth Edition. Designed for a first Computer Science (CS1) Java course, this text will provide a breath of fresh air to you and your students. The CS1 course serves as the cornerstone of the Computer Science curriculum. My primary goal is to motivate and excite all...

Enterprise, Business-Process and Information Systems Modeling: 12th International Conference
Enterprise, Business-Process and Information Systems Modeling: 12th International Conference

This book contains the proceedings of two long-running events held in connection to the CAiSE conferences relating to the areas of enterprise, business-process and information systems modeling:

• The 12th International Conference on Business Process Modeling, Development and Support (BPMDS 2011) • The 16th...

Microsoft SQL Server 2008 R2 Master Data Services
Microsoft SQL Server 2008 R2 Master Data Services

It is not customary to start a foreword with an admission that the writer of the foreword has only recently come to personally know the author of the book. I started hearing about Adatis, the company for which Jeremy works, a few years ago. The context was always around Business Intelligence implementations in the United Kingdom, always made...

MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook
MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook

MDX-related books often dedicate a significant part of their content to explaining the concepts of multidimensional cubes, the MDX language and its functions, and other specifics related to working with Analysis Services. And that's perfectly fine, there should be books like that, the tutorials that teach the concepts. However, that also...

Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche is a process that builds new information upon previous knowledge as we learn. As Isaac Newton said, “If I have seen further than...

The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)
The Next Wave: Using Digital Technology to Further Social and Political Innovation (Brookings FOCUS Book)

The digital revolution is in full force but many public and private sector leaders are stymied: How can they maximize the full potential of digital technology? This hesitancy puts a brake on the transformational power of digital technology and means private companies and governmental bodies fall well behind other digital pioneers....

Microsoft Windows Server Administration Essentials
Microsoft Windows Server Administration Essentials

The core concepts and technologies you need to administer a Windows Server OS

Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various...

The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)

This book on the Twitter API is geared to the programmer who is just a bit past beginner—who knows the basics of LAMP, including how to set up a basic server, PHP, JavaScript, HTML, and CSS. You do not have to be an expert programmer to use this book, but you should know how to look things up. In writing this book, we have tried...

Rick Sammon's HDR Photography Secrets for Digital Photographers
Rick Sammon's HDR Photography Secrets for Digital Photographers

Yes! Th is book is about High Dynamic Range (HDR) photography. And you are going to love the extraordinary results of HDR techniques.

But keep in mind that photography is photography—no matter what you call your approach or delivery. Th at’s why this book begins with tips that will not only help your HDR...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Result Page: 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy