Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Macintosh Switcher's Guide (Wordware Macintosh Library)
Macintosh Switcher's Guide (Wordware Macintosh Library)
Maybe you saw the Switcher advertisements on television or the
web. Maybe you were drawn into an Apple Store by the beautiful
machine in the display. Maybe you’ve always thought a little differently,
or wanted something a little different for a change.
Whatever the reason for your switch to Macintosh, here you are....
Modeling Derivatives in C++
Modeling Derivatives in C++

This book is the definitive and most comprehensive guide to modeling derivatives in C++ today. Providing readers with not only the theory and math behind the models, as well as the fundamental concepts of financial engineering, but also actual robust object-oriented C++ code, this is a practical introduction to the most important derivative...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)

The Easy, Example-Based Guide to Ajax for Every Web Developer

 

Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop

...

Real World Color Management, Second Edition
Real World Color Management, Second Edition
Every graphics professional worth his or her salt knows the importance of color management. No matter how much thought artist and client put into the color scheme for a given project, all of that work is for naught if you can't get your results to match your expectations. Enter Real World Color Management.

In this industrial-strength,...

Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)

This book is written from an engineer's perspective of the mind. "Artificial Mind System" exposes the reader to a broad spectrum of interesting areas in general brain science and mind-oriented studies. In this research monograph a picture of the holistic model of an artificial mind system and its behaviour is drawn, as concretely as...

Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

.NET Windows Forms Custom Controls
.NET Windows Forms Custom Controls

The intent of this book is to teach .NET developers the skills necessary to create their own leading edge custom controls. The art of creating custom controls has never been truly explored in detail, often the examples provided are trivial and do not begin to explore the requirements need for a commercial quality custom control. This book will...

Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
Agent-Based Hybrid Intelligent Systems
Agent-Based Hybrid Intelligent Systems
Many complex problems, such as financial investment planning, involve many different components or sub-tasks, each of which requires different types of processing. To solve such complex problems, a great diversity of intelligent techniques, including traditional hard computing techniques (e.g., expert systems) and soft computing techniques (e.g.,...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

unlimited object storage image
Result Page: 1153 1152 1151 1150 1149 1148 1147 1146 1145 1144 1143 1142 1141 1140 1139 1138 1137 1136 1135 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy