Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Science: An Overview (11th Edition)
Computer Science: An Overview (11th Edition)

This book presents an introductory survey of computer science. It explores the breadth of the subject while including enough depth to convey an honest appreciation for the topics involved.

Computer Science: An Overview uses broad coverage and clear exposition to present a complete picture of the dynamic computer...

Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

Quaternions for Computer Graphics
Quaternions for Computer Graphics

More than 50 years ago when I was studying to become an electrical engineer, I came across complex numbers, which were used to represent out-of-phase voltages and currents using the j operator. I believe that the letter j was used, rather than i, because the latter stood for electrical current. So from the very start of my studies I...

Java Programming: From The Ground Up
Java Programming: From The Ground Up

Java Programming: From the Ground Up begins with the fundamentals of programming, moves through the object-oriented paradigm, and concludes with an introduction to graphics and event-driven programming. The broad coverage of topics as well as the modularity of the text makes the book suitable for both introductory and intermediatelevel...

Microsoft BizTalk 2010: Line of Business Systems Integration
Microsoft BizTalk 2010: Line of Business Systems Integration

We know that it is rare in IT departments today that solutions do not have to integrate with other systems and even external entities. Systems just have to be connected to support the complex business processes and levels of automation that the business is demanding. Some of these systems are really at the core of the business. They can...

Capturing Better Photos and Video with your iPhone
Capturing Better Photos and Video with your iPhone

Building a camera into a phone makes total sense. Th ese days, nearly everyone carries a cell phone with them at all times; and nearly everyone owns a small digital camera to take snapshots of things that are happening in their life. So putting the two together was a no-brainer. Why carry two things when you can carry one?

...

The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)
The Elements of User Experience: User-Centered Design for the Web and Beyond (2nd Edition)

From the moment it was published almost ten years ago, Elements of User Experience became a vital reference for web and interaction designers the world over, and has come to define the core principles of the practice. Now, in this updated, expanded, and full-color new edition, Jesse James Garrett has refined his...

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

I suppose there are several questions that may be running through your head as you contemplate reading this book: Who is the intended audience for this book? How is this book different from book ‘x’ (insert your favorite title here)? Why should I buy it? Because these are all fair questions and I am asking you to plunk...

Hands-On Networking Fundamentals
Hands-On Networking Fundamentals

Hands-On Networking Fundamentals opens the world of computer networks to you. Computer networks arc a staple in homes, offices, and organizations. Through sharing information and resources, networks extend the power of computers worldwide. If you are new to networking or just beginning, this book is your chance to learn about networks...

Nested Relations and Complex Objects in Databases (Lecture Notes in Computer Science)
Nested Relations and Complex Objects in Databases (Lecture Notes in Computer Science)

This volume was primarily intended to present selected papers from the workshop on Theory and Applications of Nested Relations and Complex Objects, held in Darmstadt, FRG, from April 6-8, 1987. Other papers were solicited in order to provide a picture of the field as general as possible. Research on nested relations and complex objects...

Result Page: 64 63 62 61 60 59 58 57 56 55 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy