 |
|
 Struts 2 Design and Programming: A Tutorial (A Tutorial series)Offering both theoretical explanations and real-world applications, this in-depth guide covers the 2.0 version of Struts, revealing how to design, build, and improve Java-based Web applications within the Struts development framework. Feature functionality is explained in detail to help programmers choose the most appropriate ... |  |  TCP/IP Architecture, Design and Implementation in Linux (Practitioners)This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design and implementation of TCP/IP protocol in linux, this book provides different aspects of socket... |  |  Psychology of Language: From Data to Theory'In my opinion this book is a gem. It is more up to date, covers a wider range of material [than the competition] and is excellently written... a comprehensive review of this complex field, it's a certain choice for undergraduate students. It also points the more advanced student towards a radical new agenda for psycholinguistics, in which... |
|
 Matlab for Neuroscientists: An Introduction to Scientific Computing in MatlabMatlab is the accepted standard for scientific computing, used globally in virtually all Neuroscience and Cognitive Psychology laboratories. For instance, SPM, the most used software for the analysis and manipulation of fMRI images in research and clinical practice is fully programmed in matlab, and its use of the possibility to allow for... |  |  Sony A200 (Focal Digital Camera Guides)Part camera manual, part in-depth photography guide, this essential resource is a must-have for every Sony DSLR photographer.
Focal Digital Camera Guides: Sony A200
Just bought a Sony A200 and looking to combine practical know-how with inspiration? This one-stop, easy-to-read guide covers all the basic functions... |  |  The Software Vulnerability Guide (Programming Series)In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT... |
|
|
 Handbook of Pattern Recognition and Computer VisionDedicated to the memory of the late Professor King Sun Fu (1930-1985), the handbook series, with first edition (1993), second edition (1999) and third edition (2005), provides a comprehensive, concise and balanced coverage of the progress and achievements in the field of pattern recognition and computer vision in the last twenty years. This is a... |  |  The Idea of the Library in the Ancient WorldIn The Idea of the Library in the Ancient World Yun Lee Too argues that the ancient library was much more than its incarnation at Alexandria, which has been the focus for students of the subject up till now. In fact, the library is a complex institution with many different forms. It can be a building with books, but it can also be... |  |  Behind the Berlin Wall: East Germany and the Frontiers of PowerFew historical changes occur literally overnight, but on August 13 1961 eighteen million East Germans awoke to find themselves walled in by an edifice which was to become synonymous with the Cold War: the Berlin Wall.
This new history rejects traditional, top-down approaches to Cold War politics, exploring instead how the border... |
|
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 |