When you need answers for programming with C# 5.0, this practical and tightly focused book tells you exactly what you need to know—without long introductions or bloated samples. Easy to browse, it’s ideal as quick reference or as a guide to get you rapidly up to speed if you already know Java, C++, or an earlier version...
The Modern Aspects of Electrochemistry series continues with
its thirty-fifth volume but with the regrettable retirement of its founding
editor, Professor J.O’M. Bockris (see Appreciation on p. v).
As in most previous volumes, a series of five chapters is
presented covering both the electrolyte solution and...
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Clojure is a practical, general-purpose language that offers expressivity rivaling other dynamic languages like Ruby and Python, while seamlessly taking advantage of Java libraries, services, and all of the resources of the JVM ecosystem. This book helps you learn the fundamentals of Clojure with examples relating it to the languages...
When first learning the iOS developm ent environment, it is natural to be overwhelmed with
new concepts like view controllers and table views. While experience with previous development
environments and languages is helpful, and iOS developing resources are available from Apple and
forums, it is still a daunting task to become...
We are delighted that you have engaged us to help you learn Python as
quickly and as deeply as possible. The goal of the Core Python series of
books is not to just teach developers the Python language; we want you
you to develop enough of a personal knowledge base to be able to develop
software in any application area.
...
Speaker identification is a widely used technique in several security
systems. In remote access systems, speaker utterances are recoded and
communicated through a communication channel to a receiver that performs the
identification process. Speaker identification is based on characterizing each
speaker with a set of features...
This is the 4th edition of the world's bestselling book on Objective-C programming, fully updated to cover Xcode 4.2 and Automatic Reference Counting (ARC).
Programming in Objective-C is a concise, carefully written tutorial on the basics of Objective-C and object-oriented...
For hundreds of years, the field of game design has drifted along under the radar of culture, producing
timeless masterpieces and masterful time-wasters without drawing much attention to itself-without, in fact,
behaving like a "field" at all. Suddenly, powered by the big bang of computer technology, game design has...
When migrating to the new wave of cloud-based applications, we now think about business logic, we think about automating processes, and we think about how we can make the systems better. Force.com is a cloud-based platform that is used to build and deploy enterprise applications on the cloud with minimum coding. Demand for Force.com experts...
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
these...
This book is intended for an introductory digital design course for students at the freshman
level; it is also intended for an introductory computer design course with assembly
language programming for students at the sophomore level or above. The material in the
book is suitable for students who study computer engineering,...