Home | Amazing | Today | Tags | Publishers | Years | Search 
Android in Action
Android in Action

When we set out to write the first version of this book, many friends and family wondered just what this Android thing was all about. Now, two years after the publication of the first edition, Android is nearly a household term.

The first edition of the book, Unlocking Android, enjoyed enough success that we were privileged to have...

Twitterville: How Businesses Can Thrive in the New Global Neighborhoods
Twitterville: How Businesses Can Thrive in the New Global Neighborhoods

Twitter is the most rapidly adopted communication tool in history, going from zero to ten million users in just over two years. On Twitter, word can spread faster than wildfire. Companies no longer have the option of ignoring the conversation.

Unlike other hot social media spaces, Twitterville is dominated by professionals,
...

Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Actors in Scala
Actors in Scala

Recent trends in computer architecture make concurrency and parallelism an essential ingredient of efficient program execution. The actor model of concurrency allows you to express real-world concurrency in a natural way using concurrent processes that communicate via asynchronous messages. Scala is a programming language for the Java...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Knowledge Representation and Reasoning Under Uncertainty: Logic at Work
Knowledge Representation and Reasoning Under Uncertainty: Logic at Work

This volume is based on the International Conference Logic at Work, held in Amsterdam, The Netherlands, in December 1992. The 14 papers in this volume are selected from 86 submissions and 8 invited contributions and are all devoted to knowledge representation and reasoning under uncertainty, which are core issues of formal artificial...

Unobstructed Shortest Paths in Polyhedral Environments (Lecture Notes in Computer Science)
Unobstructed Shortest Paths in Polyhedral Environments (Lecture Notes in Computer Science)

The study of minimum paths on or around polyhedra in Euclidean 3-space is of growing importance in robotics. This work presents new algorithms based on extensions of the Voronoi diagram. Since experience with new algo- rithms is also important, this work also describes a workbench to allow experimentation.

This book is...

Utility-Based Learning from Data
Utility-Based Learning from Data

Statistical learning — that is, learning from data — and, in particular, probabilistic model learning have become increasingly important in recent years. Advances in information technology have facilitated an explosion of available data. This explosion has been accompanied by theoretical advances, permitting new and...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)

Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...

Extraordinary Comebacks: 201 Inspiring Stories of Courage, Triumph and Success
Extraordinary Comebacks: 201 Inspiring Stories of Courage, Triumph and Success

The human spirit is among the most powerful and resilient forces on the planet, and the stories of these incredible people prove that, with commitment and perseverance, you can do anything! From daunting physical challenges to spiritual crises to utter poverty, these success stories of people young and old, rich and poor, famous and...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy