Home | Amazing | Today | Tags | Publishers | Years | Search 
Service Oriented Architecture For Dummies (Computer/Tech)
Service Oriented Architecture For Dummies (Computer/Tech)
Welcome to Service Oriented Architecture (SOA) For Dummies. We are very excited by this topic and hope our enthusiasm is contagious. We believe SOA is the most important technology initiative facing businesses today. SOA is game changing, and early SOA successes make it clear that SOA is here to stay. We hope this book is enough
...
The Unified Process Transition and Production Phases : Best Practices in Implementing the UP
The Unified Process Transition and Production Phases : Best Practices in Implementing the UP
Is the Unified Process the be all and end all standard for developing object-oriented component-based software? This book is the final in a four volume series that presents a critical review of the Unified Process. The authors present a survey of the alte

This book, the last in a four-volume series, offers a critical review of the UP and
...
Fuzzy Database Modeling with XML (Advances in Database Systems)
Fuzzy Database Modeling with XML (Advances in Database Systems)

Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years. Fuzzy Database Modeling with XML introduces state-of-the-art information to the database...

Tribology in Machine Design
Tribology in Machine Design
Tribology in Machine Design explains the role of tribology in the design of machine elements. It shows how algorithms developed from the basic principles of tribology can be used in a range of practical applications within mechanical devices and systems.

The computer offers today's designer the possibility of greater stringency of
...
Half Life 2 Mods For Dummies (Computer/Tech)
Half Life 2 Mods For Dummies (Computer/Tech)
Modify gameplay, add textures, and integrate amazing effects

Develop intense environments, then share your design with players online

How cool would it be to build your own levels and customized weapons for Half-Life 2? This book will get you ready to mod so you can enjoy the ultimate gaming...

3ds max 6 Bible
3ds max 6 Bible
Whenever I withdrew to the computer room, my wife would say that I was off to my “fun and games.” I would flatly deny this accusation, saying that it was serious work that I was involved in. But later, when I emerged with a twinkle in my eye and excitedly asked her to take a look at my latest rendering, I knew that she was right....
Excel 2007 For Dummies Quick Reference (Computer/Tech)
Excel 2007 For Dummies Quick Reference (Computer/Tech)
Fast answers to frequently asked questions

Excel 2007 essentials at your fingertips!

If you like your answers quick and your information up-to-date, look no further. With this concise, superbly organized reference, you'll quickly find just what you need to know about navigating the new...

Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)
Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)

Medical Informatics and biomedical computing have grown in quantum measure over the past decade. An abundance of advances have come to the foreground in this field with the vast amounts of biomedical and genomic data, the Internet, and the wide application of computer use in all aspects of medical, biological, and health care research and...

Handbook of Algorithms for Wireless Networking and Mobile Computing
Handbook of Algorithms for Wireless Networking and Mobile Computing

Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. This volume provides the topics that are crucial for building the foundation for the design and construction of future generations of...

Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)

Knowledge, hidden in voluminous data repositories routinely created and maintained by today’s applications, can be extracted by data mining. The next step is to transform this discovered knowledge into the inference mechanisms or simply the behavior of agents and multi-agent systems. Agent Intelligence Through Data Mining addresses this...

Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Security in E-Learning (Advances in Information Security)
Security in E-Learning (Advances in Information Security)
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk...
Result Page: 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy