Boost libraries are developed by professionals, tested on multiple platforms and processor architectures, and contain reliable solutions for a wide range of tasks. This Cookbook takes you on a journey of simplifying the process of application development and guides you through writing perfect applications fast.
This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression...
The world's most effective CPA exam prep system – Business and Environmental Concepts module
Wiley CPAexcel Exam Review is the world's most trusted study guide for the Certified Public Accountant's exam – complete, comprehensive, and updated to align with the latest exam content. With 2,800...
This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...
Whether you’re a new user of Microsoft Access or an experienced Access database developer, you’ll find a number of solid improvements in Access 2002. With an eye toward enhancements both in form and function, the changes in Access make working with the interface more intuitive than ever; extend the reach of your data by giving...
Now Stan Lippman brings you C# using his famed primer format. C# PRIMER is a comprehensive, example-driven introduction to this new object-oriented programming language.
C# is a cornerstone of Microsoft's new .NET platform. Inheriting many features from both Java and C++, C# is destined to become the high-level programming...
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
In the 1950s we punished misbehaving students in middle school or junior high school by making them stay after school to do 100 multiplication or long-division math problems. Mathematics was taught in a highly ordered and mechanically repetitive manner with the objective being to master basic arithmetic skills. A decade later New Math emerged as a...
As Dr Maxwell writes in his preface to this book, his aim has been to instruct through entertainment. 'The general theory is that a wrong idea may often be exposed more convincingly by following it to its absurd conclusion than by merely announcing the error and starting again. Thus a number of by-ways appear which, it is hoped, may amuse...
Peer-to-peer (P2P) has proven as a most successful way to produce large
scale, reliable, and cost-effective applications, as illustrated for file sharing or
VoIP. P2P storage is an emerging field of application which allows peers to
collectively leverage their resources towards ensuring the reliability and
availability of user...
Cities Ranked & Rated: Your Guide to the Best Places to Live in the U.S. & Canada provides timely facts and unbiased information on over 400 U.S. and 30 Canadian cities in an easy-to-access format. Whether you're mulling over the idea of relocating, trying to decide where to start out, or just curious about how your...