Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Java 12 Programming: A step-by-step guide to learning essential concepts in Java SE 10, 11, and 12
Learn Java 12 Programming: A step-by-step guide to learning essential concepts in Java SE 10, 11, and 12

A comprehensive guide to get started with Java and gain insights into major concepts such as object-oriented, functional, and reactive programming

Key Features

  • Strengthen your knowledge of important programming concepts and the latest features in Java
  • Explore core...
Computer Science and Educational Software Design: A Resource for Multidisciplinary Work in Technology Enhanced Learning
Computer Science and Educational Software Design: A Resource for Multidisciplinary Work in Technology Enhanced Learning

Developing educational software requires thinking, problematizing, representing, modeling, implementing and analyzing pedagogical objectives and issues, as well as conceptual models and software architectures. Computer scientists face the difficulty of understanding the particular issues and phenomena to be taken into account in...

Blaming Immigrants: Nationalism and the Economics of Global Movement
Blaming Immigrants: Nationalism and the Economics of Global Movement
Immigration is shaking up electoral politics around the world. Anti-immigration and ultranationalistic politics are rising in Europe, the United States, and countries across Asia and Africa. What is causing this nativist fervor? Are immigrants the cause or merely a common scapegoat?

In Blaming Immigrants, economist
...
Understanding .NET: A Tutorial and Analysis
Understanding .NET: A Tutorial and Analysis

Microsoft's .NET is a collection of new technologies that are revolutionizing Windows-based software development. A major theme of .NET is the idea of Web services, allowing software to communicate directly with other software using Internet technologies. The .NET Framework and Visual Studio.NET, two more core aspects of this initiative, provide...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Geometric Methods for Quantum Field Theory
Geometric Methods for Quantum Field Theory
Both mathematics and mathematical physics have many active areas of research where the interplay between geometry and quantum field theory has proved extremely fruitful. Duality, gauge field theory, geometric quantization, Seiberg-Witten theory, spectral properties and families of Dirac operators, and the geometry of loop groups offer some striking...
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
Handbook of Remote Biometrics: for Surveillance and Security (Advances in Pattern Recognition)
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
Fuel Cell Engines
Fuel Cell Engines

The first fuel cell theory and application resource written for students and professionals.

With the field of fuel cells growing at a rapid pace, there is a powerful need for a single guide to the myriad disciplines related to the technology. Fuel Cell Engines provides a comprehensive and detailed introduction to the
...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Handbook of Systems and Complexity in Health
Handbook of Systems and Complexity in Health

This book is an introduction to health care as a complex adaptive system, a system that feeds back on itself. The first section introduces systems and complexity theory from a science, historical, epistemological, and technical perspective, describing the principles and mathematics. Subsequent sections build on the health applications of...

Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
unlimited object storage image
Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy