Home | Amazing | Today | Tags | Publishers | Years | Search 
Software and Compilers for Embedded Systems: 8th International Workshop, SCOPES 2004
Software and Compilers for Embedded Systems: 8th International Workshop, SCOPES 2004

This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in Amsterdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was referred to as the International Workshop on Code Generation for Embedded Systems. The first took place in 1994 in...

Web Development with Apache and Perl
Web Development with Apache and Perl

A quick look at your local bookstore’s Internet section will tell you that there are quite a few commercial packages out there for building web sites. What those books often fail to mention is that many of the world’s most popular web sites were built using freely available tools, and run on free operating systems (OS). They...

Going Corporate: A Geek's Guide
Going Corporate: A Geek's Guide

Going Corporate: A Geek's Guide shows technology workers how to gain the understanding and skills necessary for becoming an effective, promotable manager or sought-after consultant or freelancer. Technology professionals typically dive deeply into small pieces of technology—like lines of code or the design of...

Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)
Cisco Unified Presence Fundamentals (Networking Technology: IP Communications)

Unified Communications and Collaboration is on the so-called “Hot List” in any forum wherein people are discussing communications and ways to better stay in touch. This book is aimed at explaining the concepts, ideas, and capabilities behind Presence, which is likely one of the least understood and most underestimated features in...

Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Sams Teach Yourself Facebook for Business in 10 Minutes
Sams Teach Yourself Facebook for Business in 10 Minutes

Sams Teach Yourself Facebook® for Business in 10 Minutes gives you straightforward, practical answers when you need fast results. By working through its 10-minute lessons, you’ll learn how to profit from Facebook’s powerful new business tools: Facebook Pages, Places, Deals, Ads, and...

SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture
SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture

Service-Oriented Architecture is becoming the leading architecture for IT, and it is changing the way organisations work. IT is slowly but steadily gaining maturity, and becoming the flexible yet stable and reliable support for business it should be. At the same time, IT is regaining its potential to create real business innovation. SOA will...

SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide
SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide

SilverStripe CMS is an open source web content management system used by governments, businesses, and non-profit organizations around the world. It is a powerful tool for professional web development teams, and web content authors rave about how easy it is to use.

This book is a beginner-friendly introduction to SilverStripe and...

Business Aspects of Web Services
Business Aspects of Web Services

In April 2009, one of the authors of this book, Thomas Meinl, was attending the World Wide Web conference in Madrid, Spain. There, he gave a talk, in which he presented the idea of Web service reservation via derivative mechanisms. During the following discussions, it became clear that for many researchers, practitioners and managers...

Practical Arduino Engineering
Practical Arduino Engineering

Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. It's essential to institute a proper design, device instrumentation and, indeed, test your project thoroughly before committing to a...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

iOS Wow Factor: UX Design Techniques for iPhone and iPad
iOS Wow Factor: UX Design Techniques for iPhone and iPad

With the millions of apps in the crowded Apple iTunes App Store, it can be difficult to get your apps noticed. How can you make your app stand out from the crowd and get it the reviews it deserves?  iOS Wow Factor shows you how to get noticed! It explains how to go beyond the basics and where to "break the rules"...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy