Web Form Design: Filling in the Blanks
Forms make or break the most crucial online interactions: checkout, registration, and any task requiring information entry. In Web Form Design, Luke Wroblewski draws on original research, his considerable experience at Yahoo! and eBay, and the perspectives of many of the field's leading designers to show you everything you need to know...
Java EE 7 First Look
Discover the new features of Java EE 7 and learn to put them together to build a large-scale application
Explore changes brought in by the Java EE 7 platform
Master the new specifications that have been added in Java EE to develop applications without any hassle
Guide to Computational Geometry Processing: Foundations, Algorithms, and Methods
This book reviews the algorithms for processing geometric data, with a practical focus on important techniques not covered by traditional courses on computer vision and computer graphics. Features: presents an overview of the underlying mathematical theory, covering vector spaces, metric space, affine spaces, differential geometry, and finite...
Building Solutions with Microsoft Commerce Server 2002
No matter what your organization sells, a well-executed commerce solution can extend your business globally, boost profitability, and help you seize new opportunities faster. Drawing from their extensive, in-the-field experience, online business experts Clayton Peddy and Derek Armentrout teach you to quickly build and deploy a scalable,...
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...
Protecting Your Mobile App IP: The Mini Missing Manual
Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |