Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Engineering of Distributed Java Applications.: Third International Workshop, FIDJI 2003, Luxembourg-Kirchberg, Luxembourg, November 27-28, ... Papers (Lecture Notes in Computer Science)
Scientific Engineering of Distributed Java Applications.: Third International Workshop, FIDJI 2003, Luxembourg-Kirchberg, Luxembourg, November 27-28, ... Papers (Lecture Notes in Computer Science)

FIDJI 2003 was an international forum for researchers and practitioners in- rested in the advances in, and applications of, software engineering for distri- ted applicationdevelopment. Concerningthe technologies,the workshopfocused on “Java-related” technologies. It was an opportunity to present and observe the latest research,...

Object-Oriented Programming in ColdFusion
Object-Oriented Programming in ColdFusion

This book is a fast-paced tutorial to developing ColdFusion applications using an object-oriented programming approach. Complete with code examples that can be altered and applied to your application and careful explanations, this book will guide you through your first interaction with object-oriented programming within your ColdFusion...

Blender Compositing and Post Processing
Blender Compositing and Post Processing

Learn the techniques required to create believable and stunning visuals with Blender Compositor

About This Book

  • Explore Blender compositor to create spectacular visuals
  • Make the most out of Blender's node-based compositing architecture
  • Step-by-step guide full of...
Acceptance and Commitment Therapy (100 Key Points)
Acceptance and Commitment Therapy (100 Key Points)

Acceptance and Commitment Therapy: 100 Key Points and Techniques offers a comprehensive, yet concise, overview of the central features of the philosophy, theory, and practical application of ACT. It explains and demonstrates the range of acceptance, mindfulness, and behaviour change strategies that can be used in the service...

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Mathematics & Physics for Programmers (Game Development Series)
Mathematics & Physics for Programmers (Game Development Series)
Math and Physics for Programmers, Second Edition, is for many different people. If you thumb through the pages, you can gain a sense of the topics covered and the presentation of the material. The discussions of mathematics, physics, biology, and other topics are meant to help you understand how such topics can assist you as a...
Getting Started with Citrix® CloudPortal™
Getting Started with Citrix® CloudPortal™

Get acquainted with Citrix Systems®' CPSM and CPBM in order to administer cloud services smoothly and comprehensively

Overview

  • Overview of CPSM and CPBM architectures, and planning CPSM and CPBM
  • Become efficient in product management, workflow management, and billing and pricing...
Natural Language Processing with TensorFlow: Teach language to machines using Python's deep learning library
Natural Language Processing with TensorFlow: Teach language to machines using Python's deep learning library

Write modern natural language processing applications using deep learning algorithms and TensorFlow

Key Features

  • Focuses on more efficient natural language processing using TensorFlow
  • Covers NLP as a field in its own right to improve understanding for choosing TensorFlow...
FACTS: Modelling and Simulation in Power Networks
FACTS: Modelling and Simulation in Power Networks
Flexible AC Transmission Systems (FACTS) controllers are revolutionising power transmission networks resulting in increased efficiency and stability. Covering the most popular FACTS models and their interaction with the power network, the book highlights the growing importance of this technology.
  • Provides a thorough grounding in...
Basic Visual Formatting in CSS: Layout Fundamentals in CSS
Basic Visual Formatting in CSS: Layout Fundamentals in CSS

Some aspects of the Css formatting model may seem counterintuitive at first, but as you’ll learn in this practical guide, the more you work with these features, the more they make sense. Author Eric Meyer gives you a good grounding in Css visual rendering, from element box rules and concepts to the specifics of managing tricky...

Basic Concepts in Physics: From the Cosmos to Quarks (Undergraduate Lecture Notes in Physics)
Basic Concepts in Physics: From the Cosmos to Quarks (Undergraduate Lecture Notes in Physics)

"Basic Concepts in Physics: From the Cosmos to Quarks" is the outcome of the authors' long and varied teaching experience in different countries and for different audiences, and gives an accessible and eminently readable introduction to all the main ideas of modern physics. The book’s fresh approach, using a novel...

Hadoop Backup and Recovery solutions
Hadoop Backup and Recovery solutions

Learn the best strategies for data recovery from Hadoop backup clusters and troubleshoot problems

About This Book

  • Learn the fundamentals of Hadoop's backup needs, recovery strategy, and troubleshooting
  • Determine common failure points, intimate HBase, and explore different backup...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy