Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms

A good understanding of algorithms, and the knowledge of when to apply them, is crucial to producing software that not only works correctly, but also performs efficiently. This is the only book to impart all this essential information—from the basics of algorithms, data structures, and performance characteristics to...

J2EE Open Source Toolkit : Building an Enterprise Platform with Open Source Tools (Java Open Source Library)
J2EE Open Source Toolkit : Building an Enterprise Platform with Open Source Tools (Java Open Source Library)
Discover how to harness the full power of open source tools to build a free J2EE enterprise platform

The choice is yours . . . you can spend thousands of dollars on commercial enterprise platforms or you can take advantage of free, fast, and reliable open source alternatives. To make your decision even easier, this innovative book provides you...

Face It: Recognizing and Conquering the Hidden Fear That Drives All Conflict at Work
Face It: Recognizing and Conquering the Hidden Fear That Drives All Conflict at Work

Worrier. Controller. Attention-seeker. Prisoner. Victim. Fake.

Do you work with people who fit those descriptions? Does one of those names describe you?

Many different types of fear can keep talented professionals from achieving professional success. Worse, fear is the root of conflict, which can undermine the productivity...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

Vector Games Math Processors (Wordware Game Math Library)
Vector Games Math Processors (Wordware Game Math Library)
Vector math processors have, up until recently, been in the domain of
the supercomputer, such as the Cray computers. Computers that have
recently joined this realm are the Apple Velocity Engine (AltiVec)
coprocessor of the PowerPC G4 in Macintosh and UNIX computers, as
well as IBM’s Power PC-based Gekko used in the
...
UPC: Distributed Shared-Memory Programming
UPC: Distributed Shared-Memory Programming
A must-have for UPC programmers and applications developers

This publication provides an in-depth interpretation of UPC language specifications for use in highly parallel systems. With its extensive use of examples, UPC programming case studies, and illustrations, it offers new insights into developing efficient and effective UPC applications...

Foundations of Java for ABAP Programmers
Foundations of Java for ABAP Programmers
Java has been a part of developers’ vocabularies since 1995. At first it was thought of as
being a nice, neat little language that could do some amazing things for the Internet. However,
the language soon matured, and it still kept its simple approach. Developers started to realize
the awesome power of a clean uncluttered
...
Free/Open Source Software Development
Free/Open Source Software Development
In the last few years, free and open source software has gathered increasing
interest, both from the business and the academic worlds. As some projects in different
application domains, like Linux together with the suite of GNU utilities,
GNOME, KDE, Apache, sendmail, bind, and several programming languages, have
achieved huge
...
Mac OS X Internals: A Systems Approach
Mac OS X Internals: A Systems Approach

Mac OS X was released in March 2001, but many components, such as Mach and BSD, are considerably older. Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles.

Mac OS X Internals: A Systems...

Second-Generation HTS Conductors
Second-Generation HTS Conductors
The discovery of high temperature superconductors (HTS) in 1986 by two IBM
scientists led to an unprecedented explosion of research and development efforts
world-wide because of the significant potential for practical applications offered by
these materials. However, the early euphoria created by the exciting prospects was...
Virtual Education: Cases in Learning & Teaching Technologies
Virtual Education: Cases in Learning & Teaching Technologies
Early computer researchers sought ways to use the new invention for learning
and teaching purposes. Instructional computing at that time took place on mainframes
in the form of typing and reading text, but serious efforts were made to
further utilize the computer power to serve education. Examples include the Programmed
Logic
...
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy