Home | Amazing | Today | Tags | Publishers | Years | Search 
Meet the iPad 2
Meet the iPad 2

Given Apple’s advertising budget and ubiquitous ads, plus an enormous amount of media attention, it’s still difficult to determine just what an iPad is. Is it a media player or a business machine? Does it replace a laptop? There are other tablet computers on the market, as well as “netbooks” that act like...

Developments in the Theory of Cationoid Polymerisations
Developments in the Theory of Cationoid Polymerisations

I first met Peter Plesch in the late 1950s when he had established his vacuum techniques in Keele and I was embarking on my PhD. My visit to Keele was to seek advice (freely given) on handling sensitive reaction systems. I rapidly came to appreciate that Peter operated on a somewhat higher intellectual plane than many academics. All...

Beginning OS X Lion Apps Development (Beginning Apress)
Beginning OS X Lion Apps Development (Beginning Apress)

Mac OS X offers an amazing development environment for scores of technologies. It seems that developers from numerous camps are migrating to Mac en masse. Scan the room at any Ruby or Rails conference, for example, and you’ll see programmers coding on Macs almost exclusively. As developers move to Mac, almost inevitably they...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Grading Knowledge: Extracting Degree Information from Texts
Grading Knowledge: Extracting Degree Information from Texts
If you are sitting in a basement room without a view — not to mention the bars in front of the windows — and writing a book, then you better have good company. I had the best company you could imagine. Waltraud Hiltl, Katja Markert, Martin Romacker, Klemens Schnattinger, Andreas Klee and I shared very little office...
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
This volume continues the series of proceedings of the annual ADBIS conferences in the field of advances in databases and information systems.

ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into a regular East-European conference in 1996 to establish a forum for promoting interaction and
...
Droid Companion
Droid Companion

Congratulations on your new Droid smartphone! You’re going to be amazed when you discover all the ways it enables you to connect with your contacts and stay in touch with the world. You can communicate via talk, text, email, social networking, and chatting with instant messaging, and on some newer Droid phones, you may even be able to...

Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

The Game Jam Survival Guide
The Game Jam Survival Guide

Game Jams are fun. They are a creative, exciting, social experience. The goal of a Game Jam is to design a video game, either alone or in teams, as fast as humanly possible; usually in a single weekend. Some Jams are also great for making board games or card games! Game Jams can be absolutely massive group events held in conference rooms and...

Hacking the Kinect
Hacking the Kinect
Welcome to Hacking the Kinect. This book will introduce you to the Kinect hardware and help you master using the device in your own programs. We’re going to be covering a large amount of ground— everything you’ll need to get a 3-D application running—with an eye toward killer algorithms, with no unusable...
Sams Teach Yourself Windows Phone 7 Game Programming in 24 Hours
Sams Teach Yourself Windows Phone 7 Game Programming in 24 Hours

Now, there's a practical, hands-on guide to mastering game development for Windows Phone 7 with Visual C# 2010 and XNA Game Studio 4.0. One step at a time, this book teaches all facets of mobile game development, from design through publishing via Microsoft's Marketplace. Top game development author Jonathan S. Harbour starts with the...

Electrochemical Aspects of Ionic Liquids
Electrochemical Aspects of Ionic Liquids
This book introduces some basic and advanced studies on ionic liquids in the electrochemical field. Although ionic liquids are known by only a few scientists and engineers, their applications’ potential in future technologies is unlimited. There are already many reports of basic and applied studies of ionic liquids as...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy