 |
|
|
 Professional haXe and NekoProfessional haXe and Neko
haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the... |  |  Programming Sudoku (Technology in Action)Sudoku is the wildly popular new puzzle game that is taking the world by storm. Sudoku puzzles are 9×9 grids, and each square in the grid consists of a 3×3 subgrid called a minigrid. Your goal is to fill in the squares so that each column, row, and minigrid contains the numbers 1 through 9 exactly once. And some squares... |  |  C# 2.0: The Complete ReferenceHerb Schildt, the world's leading programming author, has updated and expanded his classic C# reference to cover C# 2.0 -- the newest version of Microsoft's premier programming language designed for .NET development. With carefully crafted explanations, insider tips, and hundreds of examples, this book offers in-depth coverage of all aspects of... |
|
|
 Knowledge-Based Clustering: From Data to Information GranulesDiscover the latest powerful tools in knowledge management
Knowledge-Based Clustering demonstrates how to design navigational platforms that enable information seekers to make sense of and better exploit highly diverse and heterogeneous sets of data. Moving beyond fuzzy clustering, the author shows how the promising new paradigm of... |  |  Customizing and Upgrading LinuxA fast-paced guide to customizing and performing upgrades to Linux on a network
In order to fulfill Linux’s promise of delivering speed, efficiency, and reliability to a network, you must be able to properly customize and perform upgrades on this operating system. Updated to reflect all the recent changes to the core Linux kernel up... |  |  Data Protection and Information Lifecycle Management
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In... |
|
Result Page: 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 |