Home | Amazing | Today | Tags | Publishers | Years | Search 
Event-Based Programming: Taking Events to the Limit
Event-Based Programming: Taking Events to the Limit

Languages like C#, VB .NET, and Delphi include built-in support for events, and these events become very powerful when they connect the objects and components of a system. Events make it possible for such parts to interact without any coupling. And the resulting parts can be developed and tested individually--which keeps the code clean and...

Abstract Computing Machines
Abstract Computing Machines
The book addresses ways and means of organizing computations, highlighting the relationship between algorithms and the basic mechanisms and runtime structures necessary to execute them using machines. It completely abstracts from concrete programming languages and machine architectures, taking instead the lambda calculus as the basic programming...
AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Second Edition
AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Second Edition

This is the second edition of Hanaan Rosenthals critically-acclaimed AppleScript book. It goes the extra mile to teach you AppleScriptexplaining advanced topics without leaving you behind.

AppleScript is the high-level scripting language that resides on the Mac platform. It can be used to add functionality to the Mac operating system,...

An Imitation-based Approach to Modeling Homogenous Agents Societies (Computational Intelligence and Its Applications Series)
An Imitation-based Approach to Modeling Homogenous Agents Societies (Computational Intelligence and Its Applications Series)
In a nutshell, this book treats the methods, structures, and cases on the representation(s) of the environment in multi-agent systems. The individual agents in the systems are based on the Interactivist-Expectative Theory of Agency and Learning (IETAL). During their sojourn in the environment, the agents interact with it and build their intrinsic...
Processing XML with Java: A Guide to SAX, DOM, JDOM, JAXP, and TrAX
Processing XML with Java: A Guide to SAX, DOM, JDOM, JAXP, and TrAX
Written for Java programmers who want to integrate XML into their systems, this practical, comprehensive guide and reference shows how to process XML documents with the Java programming language. It leads experienced Java developers beyond the basics of XML, allowing them to design sophisticated XML applications and parse complicated documents. ...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Manage IT!: Organizing IT Demand and IT Supply
Manage IT!: Organizing IT Demand and IT Supply
"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good...
Linux System Programming: Talking Directly to the Kernel and C Library
Linux System Programming: Talking Directly to the Kernel and C Library
This book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and...
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
The IP Multimedia Subsystem (IMS): Session Control and Other Network Operations
There are two camps of service providers who make money off of the residential Internet users today. Camp one is made up of the Googles, Yahoos, and AOLs who are often referred to as “over the top” or WEB 2.0 service providers. This camp doesn’t need IMS, or at least they haven’t shown much interest in IMS. On the other...
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
LINQ Pocket Reference
LINQ Pocket Reference
Ready to take advantage of LINQ with C# 3.0? This guide has the detail you need to grasp Microsoft's new querying technology, and concise explanations to help you learn it quickly. And once you begin to apply LINQ, the book serves as an on-the-job reference when you need immediate reminders. All the examples in the LINQ Pocket Reference are...
Head First Software Development (Brain-Friendly Guides)
Head First Software Development (Brain-Friendly Guides)
Even the best developers have seen well-intentioned software projects fail -- often because the customer kept changing requirements, and end users didn't know how to use the software you developed. Instead of surrendering to these common problems, let Head First Software Development guide you through the best practices of software...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy