Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

Blender 2.5 HOTSHOT
Blender 2.5 HOTSHOT

With Blender 2.5 Hotshot you will take a tour around Blender 3D tools and discover the tight integration between them by working on projects covering many aspects of computer image generation, modeling, lighting, compositing, animation, and the game engine.

Using a projects based approach you will learn fun and challenging...

Deploying OpenStack
Deploying OpenStack

This book is aimed at developers, technologists, and system administrators eager to understand and deploy cloud computing infrastructure projects based upon OpenStack software. It is intended to provide the reader with a solid understanding of the Open- Stack project goals, details of specific OpenStack software components,...

Analog-to-Digital Conversion
Analog-to-Digital Conversion

A book is like a window that allows you to look into the world. The window is shaped by the author and that makes that every window presents a unique view of the world. This is certainly true for this book. It is shaped by the topics and the projects throughout my career. Even more so, this book reflects my own style of working and...

Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10
Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10

The 10th International Conference on Unconventional Computation, UC 2011, was organized under the auspices of EATCS and Academia Europaea, by the Department of Mathematics of the University of Turku (Turku, Finland), and the Center for Discrete Mathematics and Theoretical Computer Science (Auckland, New Zealand). The event was held in...

Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Engineering Chemistry (as Per VTU)
Engineering Chemistry (as Per VTU)

The objective of this book is to present a substantial introduction to the ideas, phenomena and methods of the problems that are frequently observed in mathematics, mathematical physics and engineering technology. The book can be appreciated at a considerable number of levels and is designed for everyone from amateurs to research workmen.

...
Microsoft Visual Basic 2008: Complete Concepts and Techniques (Shelly Cashman)
Microsoft Visual Basic 2008: Complete Concepts and Techniques (Shelly Cashman)

The Shelly Cashman Series® offers the finest textbooks in computer education. This Microsoft Visual Basic 2008 book utilizes an innovative step-by-step pedagogy, which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

EJB 3.1 Cookbook
EJB 3.1 Cookbook

Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...

Windows 7 Inside Out, Deluxe Edition
Windows 7 Inside Out, Deluxe Edition

By some measures, Windows 7 sets a new standard for usability. It needs less out-of-the-box tweaking and troubleshooting than any Windows version we’ve ever used. The arrangement of folders and files in Windows Explorer, basic system security, User Account Control settings, and numerous other default configuration options are...

Pattern Recognition From Classical to Modern Approaches
Pattern Recognition From Classical to Modern Approaches

Recognizing patterns is at the core of man's attempts to understand the universe that we inhabit. Through the development of sensors and instruments, we have extended our ability to gather data far beyond the range and scale of man's natural senses. As a result we are now able to gather data on phenomena occurring in the far reaches...

iPhone JavaScript Cookbook
iPhone JavaScript Cookbook

Written in a cookbook style, this book offers solutions using a recipe-based approach. Each recipe contains step-by-step instructions followed by an analysis of what was done in each task and other useful information. The cookbook approach means you can dive into whatever recipes you want in no particular order. This book is for web...

Result Page: 734 733 732 731 730 729 728 727 726 725 724 723 722 721 720 719 718 717 716 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy