Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MP3: The Definitive Guide
MP3: The Definitive Guide
MP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet...
Marketing Through Search Optimization, Second Edition: How People Search and How to be found on the web
Marketing Through Search Optimization, Second Edition: How People Search and How to be found on the web
How to use the Web successfully

This book guides readers through proven techniques for achieving and measuring success in search engine marketing (i.e. how to be the top of the rank), along with a review of the most important search engines and directories.

Explains why and how marketers can and must optimize
...
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Microsoft .NET Architect Evangelist, Jit Ghosh, presents a practical companion guide to developing rich, interactive web applications with Silverlight 2. Common problems, issues, and every–day scenarios are tackled with a detailed discussion of the solution and ready–made code recipes that will save you hours of coding...
Beginning Linux Programming (Linux Programming Series)
Beginning Linux Programming (Linux Programming Series)
Provided you have some previous basic exposure to C and Unix, Beginning Linux Programming delivers an excellent overview of the world of Linux development with an appealing range of essential tools and APIs.

The standout feature of Beginning Linux Programming is its wide-ranging coverage of important topics in basic Unix...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))

The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students...

Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Designing SVG Web Graphics
Designing SVG Web Graphics

Scalable Vector Graphics is a dynamic 2D graphics format that enables designers to create graphics elements using XML. The unique functionality of SVG to render visual elements is creating new graphics horizons for design on the internet.

Designing SVG Web Graphics...

Foundations of AOP for J2EE Development (Foundation)
Foundations of AOP for J2EE Development (Foundation)
Aspect-oriented programming (AOP) is a programming paradigm that was defined at the
Xerox Palo Alto Research Center (PARC) in the mid-1990s. The roots of this paradigm can be
traced back to several works designed to improve code modularity and facilitate reuse and
maintenance.

The benefits of AOP for modularizing code have
...
unlimited object storage image
Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy