Home | Amazing | Today | Tags | Publishers | Years | Search 
Android Recipes: A Problem-Solution Approach
Android Recipes: A Problem-Solution Approach

Android is hot, and many people are developing Android applications (apps for short). Perhaps you would also like to develop apps, but are unsure about how to get started. Although you could study Google’s online Android Developer’s Guide (http://developer.android.com/guide/index.html) to acquire the needed knowledge, you...

Emergent Web Intelligence: Advanced Semantic Technologies (Advanced Information and Knowledge Processing)
Emergent Web Intelligence: Advanced Semantic Technologies (Advanced Information and Knowledge Processing)

The success of the World Wide Web depends on the ability of users to store, process and retrieve digital information regardless of distance boundaries, languages and domains of knowledge. The universality and flexibility of the World Wide Web have also enabled the rapid growth of a variety of new services and applications based on...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Intelligent Systems: Approximation by Artificial Neural Networks (Intelligent Systems Reference Library)
Intelligent Systems: Approximation by Artificial Neural Networks (Intelligent Systems Reference Library)

This brief monograph is the first one to deal exclusively with the quantitative approximation by artificial neural networks to the identity-unit operator. Here we study with rates the approximation properties of the "right" sigmoidal and hyperbolic tangent artificial neural network positive linear operators. In particular we study...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)
Cisco Unified Contact Center Enterprise (UCCE) (Networking Technology: IP Communications)

With all the fantastic Cisco documentation available online, why does the world of UCCE need this book? UCCE is such a big topic that it would be easy to think that it is possible to try and cover absolutely everything. Unfortunately, this would turn this book into nothing more than a product reference manual that could potentially be...

Advanced Topics in Computational Partial Differential Equations: Numerical Methods and Diffpack Programming
Advanced Topics in Computational Partial Differential Equations: Numerical Methods and Diffpack Programming

This book is about solving partial differential equations (PDEs) . Such equations are used to model a wide range of phenomena in virtually all fields of science and technology. In the last decade, the general availability of extremely powerful computers has shifted the focus in computational mathematics from simplified model problems...

Social Location Marketing: Outshining Your Competitors on Foursquare, Gowalla, Yelp & Other Location Sharing Sites
Social Location Marketing: Outshining Your Competitors on Foursquare, Gowalla, Yelp & Other Location Sharing Sites

Social Location Marketing

 

Breakthrough social location marketing techniques for promoting your service, product, or venue!

 

Social Location Marketing offers...

Microsoft Visual Basic 2010 for Windows Applications: Introductory (Shelly Cashman)
Microsoft Visual Basic 2010 for Windows Applications: Introductory (Shelly Cashman)

The Shelly Cashman Series® offers the finest textbooks in computer education. This Microsoft Visual Basic 2010 book utilizes an innovative step-by-step pedagogy, which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)
Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)

The specifications in this book are the result of a number of case studies performed by researchers from the Programming Research Group at the University of Amsterdam. The primary goal was to study the use of the techniques developed by the Programming Research Group for the specification of real-life protocols. From the pool of...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

Mastering VBA for Office 2010
Mastering VBA for Office 2010

Visual Basic for Applications (VBA) is a powerful tool that enables you to automate operations in the Microsoft Offi ce applications and in other applications that host VBA. By automating operations using VBA, you can save yourself and your colleagues huge amounts of time and effort. Getting more work done in less time is usually good...

Result Page: 609 608 607 606 605 604 603 602 601 600 599 598 597 596 595 594 593 592 591 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy