Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Telecommunications and Networks (Computer Weekly)
Telecommunications and Networks (Computer Weekly)
Telecommunications is an old and stable technology if you think only of telephones and telegraph. But in the 1960s came computers and the processing of data. Soon, we needed data communications to transmit data to remote PCs connected by networks. Later, these points of communications increased in number, with the transmission being no longer...
3D Programming for Windows (Pro - Developer)
3D Programming for Windows (Pro - Developer)
The Windows Presentation Foundation is a key component of .NET Framework 3.0, which is a part of Windows Vista and available for Windows XP. With the Windows Presentation Foundation, 3D images can be displayed regardless of the video-display hardware on the users machine. Focusing on developing user interface objects or simple animations, this book...
Microsoft Visual C# 2008 Step by Step
Microsoft Visual C# 2008 Step by Step
Get the hands-on, step-by-step guide to learning the latest enhancements in Microsoft Visual C# 2008. Visual C#, one of the tools in Microsoft Visual Studio® 2008, is a modern programming language designed to deliver a productive environment for creating business frameworks and reusable object-oriented components. Whether you re a...
Sams Teach Yourself C++ in 21 Days (5th Edition)
Sams Teach Yourself C++ in 21 Days (5th Edition)
Join the leagues of thousands of programmers and learn C++ from some of the best. The fifth edition of the best seller Sams Teach Yourself C++ in 21 Days, written by Jesse Liberty, a well-known C++ and C# programming manual author and Bradley L. Jones, manager for a number of high profiler developer websites, has been updated to the new...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
The Art of XSD - SQL Server XML schemas
The Art of XSD - SQL Server XML schemas

When information is exchanged in XML format, there needs to be an agreement between the sender and receiver about the structure and content of the XML document. An XSD (XML Schema Definition Language) Schema can be used to enforce this contract and validate the XML data being exchanged and, given that a lot of applications exchange...

Photoshop Elements 9 for Mac OS X: Visual QuickStart Guide
Photoshop Elements 9 for Mac OS X: Visual QuickStart Guide

With Photoshop Elements 9 for Mac OS X: Visual QuickStart Guide, readers can start with a tour of the interface and image-editing basics, or they can look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots to show readers how to capture and...

The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design

C# Programming: From Problem Analysis to Program Design requires no previous introduction to programming and only a mathematical background of high school algebra. The book uses C# as the programming language for software development; however, the basic programming concepts presented can be applied to a number of other languages....

Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages of the human speech communication process. This process, sometimes referred to as speech chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with the arrival of the message in the...
Learn Java for Android Development
Learn Java for Android Development

Learn Java for Android Development, Third Edition, is an update of a strong selling book that now includes a primer on Android app development (in Chapter 1 and Appendix C, which is distributed in the book’s code archive).  This book teaches programmers the essential Java language skills necessary for...

The Language of Game Theory : Putting Epistemics into the Mathematics of Games
The Language of Game Theory : Putting Epistemics into the Mathematics of Games

This volume contains eight papers written by Adam Brandenburger and his co-authors over a period of 25 years. These papers are part of a program to reconstruct game theory in order to make how players reason about a game a central feature of the theory. The program now called epistemic game theory extends the classical definition of a game...

unlimited object storage image
Result Page: 460 459 458 457 456 455 454 453 452 451 450 449 448 447 446 445 444 443 442 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy