Home | Amazing | Today | Tags | Publishers | Years | Search 
Java™ for Programmers (2nd Edition) (Deitel Developer Series)
Java™ for Programmers (2nd Edition) (Deitel Developer Series)

Welcome to Java—the world’s most widely used computer programming language. In this book, you’ll learn object-oriented programming—today’s key programming methodology.

You’ll create and work with many software objects in this text.

Java is the preferred language for meeting many...

Principles and Practice of Constraint Programming - CP 2006: 12th International Conference
Principles and Practice of Constraint Programming - CP 2006: 12th International Conference

The 12th International Conference on the Principles and Practice of Constraint Programming (CP 2006) was held in Nantes, France, September 24–29, 2006. Information about the conference can be found on theWeb at http://www.sciences. univ-nantes.fr/cp06/. Information about past conferences in the series can be found at...

Foundations of XML Processing: The Tree-Automata Approach
Foundations of XML Processing: The Tree-Automata Approach

Computer science, like other mathematical fields, cannot live without a tight relationship with reality. However, such a relationship is, frankly, not very common. This is probably why people so enthusiastically welcome a true meeting of theory and practice. In that sense, the coming together of XML and tree automata theory was a...

Axioms and Hulls (Lecture Notes in Computer Science)
Axioms and Hulls (Lecture Notes in Computer Science)

A FEW YEARS AGO some students and I were looking at a map that pinpointed the locations of about loo cities. We asked ourselves, "Which of these cities are neighbors of each other?" We knew intuitively that some pairs of cities were neighbors and others were not; we wanted to find a formal mathematical characterization that...

Keynote for iPad: Visual QuickStart Guide
Keynote for iPad: Visual QuickStart Guide

Welcome to Keynote for iPad: Visual QuickStart Guide. As the author of the first book about Keynote for Macintosh, I’m excited to also have the opportunity to write a book about the mobile version, Keynote for iPad.

I start the book with an overview of Keynote, move on to creating your first presentation, and...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)
The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)

From the moment it was published almost ten years ago, Elements of User Experience became a vital reference for web and interaction designers the world over, and has come to define the core principles of the practice. Now, in this updated, expanded, and full-color new edition, Jesse James Garrett has refined his...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Crystal Reports 2008 Official Guide
Crystal Reports 2008 Official Guide

Organizations of all sizes today find themselves increasingly awash in data, yet hungering for information to help them meet their business objectives. These corporations, from Main Street and Wall Street alike, have spent large amounts of time and money over the past 10 or so years implementing systems to help collect data on and...

Moodle 2.0 E-Learning Course Development
Moodle 2.0 E-Learning Course Development

Moodle is the leading open source learning management system. Using Moodle, teachers can easily construct richly-textured web-based courses. A course can consist of a number of lessons, with each lesson including reading materials; activities such as quizzes, tests, surveys, and projects; and social elements that encourage interaction and...

Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)

The chapters in this volume were presented at the July–August 2006 NATO Advanced Study Institute on Imaging for Detection and Identification. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the eighth time we gathered at this idyllic spot to explore and...

The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)

In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements. Written by pioneering consultants and bestselling authors with track records of international success, The...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy