Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Managing Skin Cancer
Managing Skin Cancer

Skin cancer is the most common malignant neoplasm and its incidence is rising worldwide. The epidemic increase in such tumors calls for efficient management by the application of appropriate guidelines for therapy and prevention. Clinicians managing these patients need to keep up to date with the latest advances, allowing them to provide optimal...

REST in Practice: Hypermedia and Systems Architecture
REST in Practice: Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and...

Environmental Principles and Policies: An Interdisciplinary Approach
Environmental Principles and Policies: An Interdisciplinary Approach

This book discusses six major principles of relevance to environmental issues and uses them to evaluate a set of environmental policies. The principles chosen include three that are specific to environmental matters – ecological sustainability, the polluter pays principle and the precautionary principle – and three more that have...

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific
Design and Usability of Digital Libraries: Case Studies in the Asia Pacific

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific showcases some of the best digital library practices from organizations in the Asia Pacific. Particular emphasis has been placed on the design, use and usability of digital libraries. Not only are digital libraries examined, but related technologies, the management of...

Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)

This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...

Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

HTML5 Geolocation
HTML5 Geolocation

This book explores the W3C Geolocation API, a specification that provides scripted access to geographical location information associated with a hosted device.* This API defines objects that can be used in JavaScript to ascertain the position of the device on which the code is executed.

Truly revolutionary: now...

Pro Java 7 NIO.2 (Professional Apress)
Pro Java 7 NIO.2 (Professional Apress)

The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O

APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities of this
...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Getting Started with Paint.NET
Getting Started with Paint.NET

Learning the free Paint.NET photo editing program means you can achieve any professional effect you want, and this book shows you how, ranging from installation and plugins to advanced imaging techniques.

Overview

  • Quick and simple tutorials designed to help you master Paint.NET in minutes
  • ...
Serious ADO: Universal Data Access with Visual Basic
Serious ADO: Universal Data Access with Visual Basic

From seasoned developer and trainer Rob Macdonald comes Serious ADO: Universal Data Access with Visual Basic, which teaches experienced Visual Basic developers how to make the most of ADO, Microsoft's flagship product for database access. Serious ADO covers the full range of uses for ADO, from basic use of...

unlimited object storage image
Result Page: 826 825 824 823 822 821 820 819 818 817 816 815 814 813 812 811 810 809 808 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy