 |
|
|
 Tucci and Usmani's The Business of Photography
So you’ve decided to be a photographer. You studied photography in
college or went to art school, and you’ve come to the point of deciding
that it’s time to hang out your shingle. Or maybe you’re self-taught and
everyone loves your work and says, “Hey, you could make... |  |  Networking Fundamentals: Wide, Local and Personal Area Communications
Information networking has emerged as a multidisciplinary diversified area of research over
the past few decades. From traditional wired telephony to cellular voice telephony and from
wired access to wireless access to the Internet, information networks have profoundly
impacted our lifestyle. At the time of writing, over 3 billion... |  |  Principles of CAD/CAM/CAE
With the dramatic changes in computing power and wider availability of software
tools for design and production, engineers are now using CAD/CAM/CAE systems
for everyday tasks, not just for demonstrations. International competition, de-
creased availability of skilled labor, and increased emphasis on quality are also
forcing... |
|
 Starting Out with C++: Early Objects (7th Edition)
Welcome to Starting Out with C++: Early Objects, 7th
Edition. This book is intended for use in a two-term or
three-term C++ programming sequence, or an
accelerated one-term course. Students new to
programming, as well those with prior course work in
other languages, will find this text beneficial. The
fundamentals ... |  |  Beginning PhoneGap: Mobile Web Framework for JavaScript and HTML5
PhoneGap is a growing and leading open-source mobile web apps development framework that lets developers build JavaScript and HTML5-based web applications with native wrappers for more than six mobile platforms, including iOS, Android, and BlackBerry. This framework lets you build HTML- and JavaScript-based apps and still take advantage... |  |  Security in Computing Systems: Challenges, Approaches and Solutions
This monograph on Security in Computing Systems: Challenges, Approaches and
Solutions aims at introducing, surveying and assessing the fundamentals of secu
rity with respect to computing. Here, “computing” refers to all activities which
individuals or groups directly or indirectly perform by means of computing sys
tems,... |
|
|
Result Page: 197 196 195 194 193 192 191 190 189 188 187 186 |