Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Language Pragmatics, Third Edition
Programming Language Pragmatics, Third Edition

A course in computer programming provides the typical student's first exposure to the field of computer science. Most students in such a course will have used computers all their lives, for email, games, web browsing, word processing, social networking, and a host of other tasks, but it is not until they write their first programs that...

Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Microsoft Office 2007 Fundamentals: Projects Binder
Microsoft Office 2007 Fundamentals: Projects Binder

Welcome to the Microsoft Office 2007 Fundamentals Projects Binder! The projects in this binder cover the primary features and commands of Office 2007 and provide valuable opportunities to apply or extend skills learned in an accompanying textbook. The 150 projects in this binder can be used with any Microsoft® Office 2007 textbook to...

The Google Phone Pocket Guide
The Google Phone Pocket Guide

When asked whether I’d be interested in writing a book about the Google phone, I immediately jumped at the offer. Although I’ve been a dyed-in-the-wool iPhone user since June 2007 (the day it came out), the Google phone has piqued my interest from the fi rst day that I heard about it. Since the early rumors of a Google...

Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition
Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition

We believe that learning in computer science and engineering should reflect the current state of the field, as well as introduce the principles that are shaping computing. We also feel that readers in every specialty of computing need to appreciate the organizational paradigms that determine the capabilities, performance, and,...

EJB 3.1 Cookbook
EJB 3.1 Cookbook

Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...

Android 3.0 Application Development Cookbook
Android 3.0 Application Development Cookbook

This book covers every aspect of mobile app development, starting with major application components and screen layout and design, before moving on to how to manage sensors such as internal gyroscopes and near field communications. Towards the end, it delves into smartphone multimedia capabilities as well as graphics and animation, web access,...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Beginning 3D Game Development with Unity: All-in-one, multi-platform game development
Beginning 3D Game Development with Unity: All-in-one, multi-platform game development

Real time 3D games have been around for well over ten years now. We’ve played them, created assets in the style of our favorites, and maybe even “mod”ed a few of them. But until recently, the cost of licensing one of the premier game engines has ranged from several hundred thousand to several million dollars per title...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

How Do Witches Fly? A practical approach to nocturnal flights.
How Do Witches Fly? A practical approach to nocturnal flights.

Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...

Result Page: 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy