Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Amazon EC2
Programming Amazon EC2

Thank you for picking up a copy of this book. Amazon Web Services (AWS) has amazed everyone: Amazon has made lots of friends, and all its “enemies” are too busy admiring AWS to do much fighting back. At the moment, there is no comparable public Infrastructure as a Service (IaaS); AWS offers the services at a scale that has...

Map Scripting 101: An Example-Driven Guide to Building Interactive Maps with Bing, Yahoo!, and Google Maps
Map Scripting 101: An Example-Driven Guide to Building Interactive Maps with Bing, Yahoo!, and Google Maps

The Web has changed our lives in many ways. The first online, on-demand driving directions from MapQuest very nearly rendered traditional road atlases obsolete. Today, many websites that provide driving directions also make their maps available to developers. Using these mapping APIs, you can plot your own points or...

Facebook Graph API Development with Flash
Facebook Graph API Development with Flash

This step-by-step book gives you an empty shell of an AS3 Facebook RIA, and guides you through writing the Facebook interaction code by means of fun examples, exercises, and code snippets.This beginner's guide focuses on getting you through all the major learning points in a smooth, logical order. You'll also see how to avoid some...

Swing Extreme Testing: The Extreme approach to complete Java application testing
Swing Extreme Testing: The Extreme approach to complete Java application testing

This book summarizes twenty years of experience testing software.

For the past decade, we have been the principal developers of LabWizard, which is the gold standard in Knowledge Acquisition tools and is used around the world to provide patient-specific interpretations of pathology cases. LabWizard is a very complex suite of...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

Advertising: A Very Short Introduction (Very Short Introductions)
Advertising: A Very Short Introduction (Very Short Introductions)

Advertising is riddled with myths and misunderstandings. It is simultaneously believed to be both immensely powerful and immensely wasteful, to increase economic prosperity and to be morally questionable. Neither its historic origins nor its  modern operations are well understood. Many of these mythsand misunderstandings are almost as...

How to Do Everything Netbook
How to Do Everything Netbook

Get the most out of your netbook!

Now that you've got a netbook, it's time to find out how to maximize all of its capabilities. This hands-on guide explains how you can keep your netbook running at peak performance by limiting how many programs you run concurrently and what you download. Learn the best ways to connect to...

Darwin and Evolution for Kids: His Life and Ideas with 21 Activities (For Kids series)
Darwin and Evolution for Kids: His Life and Ideas with 21 Activities (For Kids series)
Darwin and Evolution for Kids traces the transformation of a privileged and somewhat scatterbrained youth into the great thinker who proposed the revolutionary theory of evolution. Through 21 hands-on activities, young scientists learn about Darwin’s life and work and assess current evidence of evolution. Activities...
Information Flow Control for Java: A Comprehensive Approach Based on Path Conditions in Dependence Graphs
Information Flow Control for Java: A Comprehensive Approach Based on Path Conditions in Dependence Graphs

This thesis presents several precise techniques that analyze object-oriented languages for security violations, together with evaluations on Java benchmarks. The key question that will be targeted throughout this work is “Can a given statement directly or indirectly influence another statement, and if this is possible, how can this...

Geographic Data Mining and Knowledge Discovery, Second Edition
Geographic Data Mining and Knowledge Discovery, Second Edition

Similar to many research and application fields, geography has moved from a datapoor and computation-poor to a data-rich and computation-rich environment. The scope, coverage, and volume of digital geographic datasets are growing rapidly. Public and private sector agencies are creating, processing, and disseminating digital data on land use,...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Data Source Handbook
Data Source Handbook

If you're a developer looking to supplement your own data tools and services, this concise ebook covers the most useful sources of public data available today. You'll find useful information on APIs that offer broad coverage, tie their data to the outside world, and are either accessible online or feature downloadable bulk...

Result Page: 147 146 145 144 143 142 141 140 139 138 137 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy