Home | Amazing | Today | Tags | Publishers | Years | Search 
The WordPress Anthology
The WordPress Anthology
WordPress is the most widely used website platform and content management system on the Web today, running on approximately 15% of websites. It is open source and, hence, free, released under the GNU Public License version 2, or GPL2 for short. Its permissive use and development license, combined with its ease of use from both a...
App Inventor for Android: Build Your Own Apps - No Experience Required!
App Inventor for Android: Build Your Own Apps - No Experience Required!

When Android was first introduced by Google and the Open Handset Alliance, my first thought was of how awesome it would be to have a free open-source application environment for the growing smart phone revolution. The harsh reality hit when I tried to apply my rusty programming skills to the Java and Android software development kit (SDK)....

Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Linear Programming: An Introduction with Applications
Linear Programming: An Introduction with Applications
This book is aimed at freshman, sophomores, and juniors in college who are even remotely interested in some of the current applications of mathematics to the real world. The difficulty with most of the other linear programming books on the market is that they are high end books, written primarily in a fairly rigorous fashion...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data Clustering in C++: An Object-Oriented Approach (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data clustering is a highly interdisciplinary field whose goal is to divide a set of objects into homogeneous groups such that objects in the same group are similar and objects in different groups are quite distinct. Thousands of papers and a number of books on data clustering have been published over the past 50 years....
Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Data Structures and Algorithm Analysis in C (2nd Edition)
Data Structures and Algorithm Analysis in C (2nd Edition)

This book describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more careful attention...

Digital Video Broadcasting: Technology, Standards, and Regulations
Digital Video Broadcasting: Technology, Standards, and Regulations
Many books and articles on the transition of television from analog to digital transmission have been published in recent years. This transition is still in its infancy, but it will inevitably take place in the years to come. Due to digitization, the existing barriers between audio, video, and data generation and transmission...
Data Structures and Algorithm Analysis in Java (3rd Edition)
Data Structures and Algorithm Analysis in Java (3rd Edition)

This new Java edition describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more...

Result Page: 622 621 620 619 618 617 616 615 614 613 612 611 610 609 608 607 606 605 604 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy