 |
|
 Java™ for Programmers (2nd Edition) (Deitel Developer Series)
Welcome to Java—the world’s most widely used computer programming language. In this
book, you’ll learn object-oriented programming—today’s key programming methodology.
You’ll create and work with many software objects in this text.
Java is the preferred language for meeting many... |  |  |  |  Foundations of XML Processing: The Tree-Automata Approach
Computer science, like other mathematical fields, cannot live without a tight relationship
with reality. However, such a relationship is, frankly, not very common.
This is probably why people so enthusiastically welcome a true meeting of theory
and practice. In that sense, the coming together of XML and tree automata theory
was a... |
|
 Axioms and Hulls (Lecture Notes in Computer Science)
A FEW YEARS AGO some students and I were looking at a map that pinpointed the
locations of about loo cities. We asked ourselves, "Which of these cities are neighbors
of each other?" We knew intuitively that some pairs of cities were neighbors and others
were not; we wanted to find a formal mathematical characterization that... |  |  Keynote for iPad: Visual QuickStart Guide
Welcome to Keynote for iPad: Visual
QuickStart Guide. As the author of the
first book about Keynote for Macintosh,
I’m excited to also have the opportunity
to write a book about the mobile version,
Keynote for iPad.
I start the book with an overview of Keynote,
move on to creating your first presentation,
and... |  |  Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as... |
|
|
|
| Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |