Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Open Source Projects: A Wiley Tech Brief
Managing Open Source Projects: A Wiley Tech Brief

The only guide to managing and integrating the open source model

With the phenomenal success of Linux, companies are taking open source business solutions much more seriously than ever before. This book helps to satisfy the growing demand for guidance on how to manage open source enterprise development projects. Expert Jan Sandred...

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific
Design and Usability of Digital Libraries: Case Studies in the Asia Pacific

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific showcases some of the best digital library practices from organizations in the Asia Pacific. Particular emphasis has been placed on the design, use and usability of digital libraries. Not only are digital libraries examined, but related technologies, the management of...

The Business of iPhone and iPad App Development: Making and Marketing Apps that Succeed
The Business of iPhone and iPad App Development: Making and Marketing Apps that Succeed

The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a “gold rush” for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a...

Algebra DeMYSTiFieD, Second Edition
Algebra DeMYSTiFieD, Second Edition

Your SOLUTION to mastering ALGEBRA!

Trying to tackle algebra but nothing's adding up? No problem! Factor in Algebra Demystified, Second Edition and multiply your chances of learning this important branch of mathematics.

Written in a step-by-step format, this practical guide covers fractions, variables,...

Software and Patents in Europe (Cambridge Intellectual Property and Information Law)
Software and Patents in Europe (Cambridge Intellectual Property and Information Law)

The computer program exclusion from Article 52 of the European Patent Convention (EPC) proved impossible to uphold as industry moved over to digital technology, and the Boards of Appeal of the European Patent Organisation (EPO) felt emboldened to circumvent the EPC in Vicom by creating the legal fiction of 'technical effect'. This...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques

This volume contains the papers presented at the 14th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2011) and the 15th International Workshop on Randomization and Computation (RANDOM 2011), which took place concurrently in Princeton University, USA, during August 17–19,...

The AWK Programming Language
The AWK Programming Language

Computer users spend a lot of time doing simple, mechanical data manipulation - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like. All of these jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose program in a...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Automatic Ambiguity Resolution in Natural Language Processing
Automatic Ambiguity Resolution in Natural Language Processing

Natural language processing is often called an "Al-complete" task, in the sense that in order to truly process language (i.e. to comprehend, to translate, to generate) full understanding is required, which is itself the ultimate goal of Artificial Intelligence. For those who seek solutions to practical problems, this is not a...

Analytical Characterization of Aluminum, Steel, and Superalloys
Analytical Characterization of Aluminum, Steel, and Superalloys

The Analytical Characterization of Aluminum, Steel, and Superalloys addresses the needs of the practicing materials scientist and engineer, whether in an industrial or university setting, and the advanced student. This handbook provides a fundamental overview of a wide range of characterization methodologies and does not provide an...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy