Home | Amazing | Today | Tags | Publishers | Years | Search 
The Essential Guide to Dreamweaver CS3 with CSS, Ajax, and PHP
The Essential Guide to Dreamweaver CS3 with CSS, Ajax, and PHP
The Essential Guide to Dreamweaver CS3 with CSS, Ajax, and PHP . . . Wow, the title’s almost as long as the book! And what’s that “essential” doing in there? “Essential” suggests that it’s a book you can’t do without. So, who’s it for and why should you be reading it?

Dreamweaver
...
Learning Theory: 17th Annual Conference on Learning Theory, COLT 2004, Banff, Canada, July 1-4, 2004, Proceedings
Learning Theory: 17th Annual Conference on Learning Theory, COLT 2004, Banff, Canada, July 1-4, 2004, Proceedings
This book constitutes the refereed proceedings of the 17th Annual Conference on Learning Theory, COLT 2004, held in Banff, Canada in July 2004.

The 46 revised full papers presented were carefully reviewed and selected from a total of 113 submissions. The papers are organized in topical sections on economics and game theory, online learning,...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
ANSI Common LISP
ANSI Common LISP
Combines an introduction to Lisp programming and a convenient, up-to-date reference manual for ANSI Common Lisp. Professional programmers will appreciate its thorough, practical approach. Paper. DLC: COMMON LISP (Computer program language)

Teaching users new and more powerful ways of thinking about programs, this
...
Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
The 11th Conference “Artificial Intelligence: Methodology, Systems, Applications – Semantic Web Challenges” (AIMSA 2004) continued successfully pursuing the main aim of the AIMSA series of conferences – to foster the multidisciplinary community of artificial intelligence researchers, embracing both the theoretic...
Hacking MythTV (ExtremeTech)
Hacking MythTV (ExtremeTech)
Want control? Build your own MythTV PC.

You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,...

Programming Erlang: Software for a Concurrent World
Programming Erlang: Software for a Concurrent World
Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.

Moore's Law is the observation that the amount you can do on a single chip...

Stl Tutorial & Reference Guide: C++ Programming With the Standard Template Library (Addison-Wesley Professional Computing Series)
Stl Tutorial & Reference Guide: C++ Programming With the Standard Template Library (Addison-Wesley Professional Computing Series)
The Standard Template Library (STL) represents a breakthrough in C++ programming methodology. Comprising a set of C++ generic data structures and algorithms, STL provides reusable, interchangeable components adaptable to many different uses without sacrificing efficiency. Adopted by the ANSI/ISO C++ Standards Committee, STL is an important addition...
E-Business Strategy, Sourcing and Governance
E-Business Strategy, Sourcing and Governance
E-Business Strategy, Sourcing and Governance is based on the premise that it is difficult, if not impossible, to manage a modern business or public organization without at least some knowledge of the planning, use, control, and benefits of information technology. Managers need to have an understanding of strategy development, including the current...
Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)
Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their...
Result Page: 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy