Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Parallel Programming with Python
Parallel Programming with Python

Develop efficient parallel systems using the robust Python environment

About This Book

  • Demonstrates the concepts of Python parallel programming
  • Boosts your Python computing capabilities
  • Contains easy-to-understand explanations and plenty of examples

Who...

Antisense Drug Technology: Principles, Strategies, and Applications, Second Edition
Antisense Drug Technology: Principles, Strategies, and Applications, Second Edition

Extensively revised and updated, Antisense Drug Technology: Principles, Strategies, and Applications, Second Edition reflects the logarithmic progress made in the past four years of oligonucleotide-based therapies, and, in particular, antisense therapeutics and research. Interpreting lessons learned from the clinical trials of first...

Parallel Robots (Solid Mechanics and Its Applications)
Parallel Robots (Solid Mechanics and Its Applications)

Parallel robots are closed-loop mechanisms presenting very good performances in terms of accuracy, velocity, rigidity and ability to manipulate large loads. They have been used in a large number of applications ranging from astronomy to flight simulators and are becoming increasingly popular in the field of machine-tool industry. This book...

Practical Webix: Learn to Expedite and Improve your Web Development
Practical Webix: Learn to Expedite and Improve your Web Development
Learn to create speedy cross-platform applications with ease using Webix. You will begin with an introduction to Webix and basic usage, exploring the interface components and utilities it offers, as well as the tools available (skin builder, form builder, and code snippet testing facility).

You’ll understand how Webix
...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Professional Android Sensor Programming
Professional Android Sensor Programming

ANDROIDS ARE ALIVE. THEY CAN LOCATE THEMSELVES, see, listen, and understand speech. They can sense radio signals and detect orientation, movement, and environmental properties. Can your computer do all of that?

The availability of sensors is one feature Android devices have that makes them different from other computers. Without...

Myelopathy, Radiculopathy, and Peripheral Entrapment Syndromes
Myelopathy, Radiculopathy, and Peripheral Entrapment Syndromes

Richly illustrated and easy to use, Myelopathy, Radiculopathy, and Peripheral Entrapment Syndromes presents extensive and up-to-date information about the etiopathic and clinical presentation of neurovascular compression insult to the spinal cord, spinal nerve roots, and peripheral nerves. Written with both the student and practitioner in...

Supercritical Water Processing Technologies for Environment, Energy and Nanomaterial Applications
Supercritical Water Processing Technologies for Environment, Energy and Nanomaterial Applications

This book systematically presents the technical aspects of supercritical water oxidation and supercritical water gasification for energy and environmental applications, which include reactor design, construction materials, corrosion, salt precipitation, etc. The book provides a comprehensive introduction to the properties of...

A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
A Computational Model of Natural Language Communication: Interpretation, Inference, and Production in Database Semantics
Everyday life would be easier if we could simply talk with machines instead of having to program them. Before such talking robots can be built, however, there must be a theory of how communicating with natural language works. This requires not only a grammatical analysis of the language signs, but also a model of the cognitive agent, with...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

C++ GUI Programming with Qt 3 (Bruce Peren's Open Source)
C++ GUI Programming with Qt 3 (Bruce Peren's Open Source)
The first official Trolltech guide to Qt 3.2 programming!

Straight from Trolltech, this book covers all you need to build industrial-strength applications with Qt 3.2.x and C++--applications that run natively on Windows, Linux/Unix, Mac OS X, and embedded Linux with no source code changes! The book teaches solid Qt programming practices; it is...

Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy