Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Java 7 (Beginning Apress)
Beginning Java 7 (Beginning Apress)

Welcome to Java. This chapter launches you on a tour of this technology by focusing on fundamentals. First, you receive an answer to the “What is Java?” question. If you have not previously encountered Java, the answer might surprise you. Next, you are introduced to some basic tools that will help you start developing Java...

Drupal 7 Bible
Drupal 7 Bible

Welcome to Drupal 7 Bible. Like all books in the Bible series, you can expect to find both hands-on tutorials and real-world practical applications, as well as reference and background information that provide a context for what you are learning. This book is a fairly comprehensive resource on the Drupal open-source content management system....

Information Retrieval: Implementing and Evaluating Search Engines
Information Retrieval: Implementing and Evaluating Search Engines

An academic dynasty has come together to write an excellent textbook on information retrieval. Stefan Buttcher, Charles Clarke, and Gordon Cormack make up three generations of stellar information retrieval researchers with over fifty years of combined experience. Buttcher was Clarke's doctoral student, and Clarke was Cormack's...

Analytical Methods for Food Additives (Woodhead Publishing Series in Food Science, Technology and Nutrition)
Analytical Methods for Food Additives (Woodhead Publishing Series in Food Science, Technology and Nutrition)

Additives are added to food to perform different technological functions, for example, to increase shelf life (preservatives), or to protect against rancidity (antioxidants). The use of additives in food is controlled by separate legislation relating to, for example, colours in food, sweeteners, miscellaneous additives (other than...

Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment

The Millennium Ecosystem Assessment (MA) was carried out between 2001 and 2005 to assess the consequences of ecosystem change for human well-being and to establish the basis for actions needed to enhance the conservation and sustainable use of ecosystems and their contributions to human well-being. The MA was originally conceived as a...

SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide
SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide

SilverStripe CMS is an open source web content management system used by governments, businesses, and non-profit organizations around the world. It is a powerful tool for professional web development teams, and web content authors rave about how easy it is to use.

This book is a beginner-friendly introduction to SilverStripe and...

Ecosystem Responses to Mercury Contamination: Indicators of Change
Ecosystem Responses to Mercury Contamination: Indicators of Change

As rising levels of mercury in the environment pose an increasing threat of toxicity to humans and wildlife, several laws already call for industries to reduce mercury emissions at the source. Ecosystem Responses to Mercury Contamination: Indicators of Change outlines the infrastructure and methods needed to measure, monitor, and regulate the...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Analytical Characterization of Aluminum, Steel, and Superalloys
Analytical Characterization of Aluminum, Steel, and Superalloys

The Analytical Characterization of Aluminum, Steel, and Superalloys addresses the needs of the practicing materials scientist and engineer, whether in an industrial or university setting, and the advanced student. This handbook provides a fundamental overview of a wide range of characterization methodologies and does not provide an...

Python Testing Cookbook
Python Testing Cookbook

Testing has always been a part of software development. For decades, comprehensive testing was defined by complex manual test procedures backed by big budgets; but something revolutionary happened in 1998. In his Guide to Better Smalltalk, Smalltalk guru Kent Beck introduced an automated test framework called SUnit. This triggered an...

Launching the Imagination 3D
Launching the Imagination 3D

Designed for courses in Creativity and Three-Dimensional Design, Launching the Imagination offers a comprehensive framework on which students, teachers, and administrators can build. The approach in this third edition is refined, distilled, and updated, using over 375 examples drawn from traditional and contemporary sources. Interviews...

Result Page: 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy