Home | Amazing | Today | Tags | Publishers | Years | Search 
Real World .NET, C#, and Silverlight: Indispensible Experiences from 15 MVPs (Wrox Programmer to Programmer)
Real World .NET, C#, and Silverlight: Indispensible Experiences from 15 MVPs (Wrox Programmer to Programmer)
THIS BOOK IS AN OBVIOUS COMPILATION FROM MANY AUTHORS. When putting together the idea for this book, we thought of putting a different style of book together from the get-go. Many of the computer books on the market today are a thorough explanation of a specifi c area of technology tackled by one or a handful of dedicated authors....
Google+ For Dummies
Google+ For Dummies
Chances are you’re one of the 750 million or so users of Facebook, or maybe you’ve tried Twitter or another social network. Google has responded to the lively interest in social networking with one of its own called Google+ (also known as “Google Plus” or even just “g+”), and Google+ is...
Advances in Information Retrieval: 31th European Conference on IR Research, ECIR 2009, Toulouse, France
Advances in Information Retrieval: 31th European Conference on IR Research, ECIR 2009, Toulouse, France
These proceedings contain the papers presented at ECIR 2009, the 31st European Conference on Information Retrieval. The conference was organized by the Institut de Recherche en Informatique de Toulouse (IRIT), in cooperation with the Information Retrieval Specialist Group of the British Computer Society (BCS-IRSG) and was...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)
Cloud Computing for Enterprise Architectures (Computer Communications and Networks)

Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...

Linear Programming: An Introduction with Applications
Linear Programming: An Introduction with Applications
This book is aimed at freshman, sophomores, and juniors in college who are even remotely interested in some of the current applications of mathematics to the real world. The difficulty with most of the other linear programming books on the market is that they are high end books, written primarily in a fairly rigorous fashion...
What's New in Adobe AIR 3
What's New in Adobe AIR 3
This book will detail the various enhancements, new functionalities, and general improvements available in this version of the Adobe AIR runtime. Each item is explained in detail, and when possible, a series of screen captures and a full code example will be provided, enabling you to both grasp the new feature in a visual way, and...
Introducing HTML5 (2nd Edition)
Introducing HTML5 (2nd Edition)

Welcome to the second edition of the Remy & Bruce show. Since the first edition of this book came out in July 2010, much has changed: support for HTML5 is much more widespread; Internet Explorer 9 finally came out; Google Chrome announced it would drop support for H.264 video; Opera experimented with video streaming...

iOS Development using MonoTouch Cookbook
iOS Development using MonoTouch Cookbook
Technology is advancing quite rapidly. Portable devices, such as media players, smartphones, and tablets, have brought huge advancements and changes in the way people communicate, share, and consume digital content. Developers need to be up-to-date with the available platforms these devices work on, if they want to be "part of the...
OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
This volume continues the series of proceedings of the annual ADBIS conferences in the field of advances in databases and information systems.

ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into a regular East-European conference in 1996 to establish a forum for promoting interaction and
...
Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy