Home | Amazing | Today | Tags | Publishers | Years | Search 
Core Animation: Simplified Animation Techniques for Mac and iPhone Development
Core Animation: Simplified Animation Techniques for Mac and iPhone Development

Apple’s Core Animation framework enables Mac OS X, iPhone, and iPod touch developers to create richer, more visual applications–more easily than ever and with far less code. Now, there’s a comprehensive, example-rich, full-color reference to Core Animation for experienced OS X and iPhone developers who want...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Programming Mobile Robots with Aria and Player: A Guide to C++ Object-Oriented Control
Programming Mobile Robots with Aria and Player: A Guide to C++ Object-Oriented Control

Programming Mobile Robots with Aria and Player provides a comprehensive guide to creating object-oriented C++ programs for robots using the Player and Aria APIs within a Linux environment. A basic knowledge of object-oriented techniques is assumed, but the text is written in a user-friendly style, and is equally suitable for researchers...

Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional Solution
Oracle Essbase & Oracle OLAP: The Guide to Oracle's Multidimensional Solution
We have seen tremendous consolidation in the high-technology industry in recent years. Mergers and acquisitions strengthen the product offerings of a company, but they also sometimes bring together products that, on the face of it, seem either to duplicate a solution or to present no possibility of working together.

In 2007, Oracle
...
JSF 1.2 Components
JSF 1.2 Components
This book is a practical, hands-on guide to learning JavaServer Faces components based on a fictitious computer hardware e-commerce application. It adopts an example-driven approach focused on solving common web application development tasks using a wide range of JSF components from today's most popular JSF component libraries. Each chapter covers...
Human Memory Modeled with Standard Analog and Digital Circuits: Inspiration for Man-made Computers
Human Memory Modeled with Standard Analog and Digital Circuits: Inspiration for Man-made Computers
Gain a new perspective on how the brain works and inspires new avenues for design in computer science and engineering

This unique book is the first of its kind to introduce human memory and basic cognition in terms of physical circuits, beginning with the possibilities of ferroelectric behavior of neural membranes, moving...

Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Middleware Management with Oracle Enterprise Manager Grid Control 10g R5
Today's IT environment is very complex, encompassing a myriad of technologies and middleware platforms. Many organizations have large and heterogeneous middleware platforms that power their enterprise applications and it is often a real challenge for administrators to meet agreed service levels and minimize downtime. Oracle Enterprise Manager...
Spring Persistence with Hibernate
Spring Persistence with Hibernate

Spring is the leading platform to build and run enterprise Java applications. Spring's Hibernate integration makes it easy to mix and match persistence methodologies simplifying your Hibernate applications. You can incorporate lots of Inversion of Control (IoC) convenience features to address many typical Hibernate integration issues,...

The Essential Guide to Computer Data Storage: From Floppy to DVD
The Essential Guide to Computer Data Storage: From Floppy to DVD

A world without data storage is like a mankind without memory. Thanks to various information storage methods developed in the last 22,000 years, we are able to document our history, to learn from each other's experience, and, ultimately, to create the world as it is today.

The future of computing is...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

How to Manage People (Creating Success)
How to Manage People (Creating Success)
How to Manage People is a practical new book from bestselling author Michael Armstrong. A distillation of all his knowledge and experience, it provides advice to managers and team leaders on how to manage people in their teams, getting the best results from them and dealing with any people problems that may arise.
...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Result Page: 549 548 547 546 545 544 543 542 541 540 539 538 537 536 535 534 533 532 531 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy