Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C# 3.0 Unleashed: With the .NET Framework 3.5
C# 3.0 Unleashed: With the .NET Framework 3.5
Whether you need an approachable on-ramp to .NET or you want to enhance your skills, C# 3.0 Unleashed is a comprehensive, in-depth guide to the solutions you seek. You’ll learn to do more with the new tools that are available, including Visual Studio 2008 and the .NET Framework Class Libraries. Throughout this book, you’ll get a...
Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

OpenCL in Action: How to Accelerate Graphics and Computations
OpenCL in Action: How to Accelerate Graphics and Computations
In the summer of 1997, I was terrified. Instead of working as an intern in my major (microelectronic engineering), the best job I could find was at a research laboratory devoted to high-speed signal processing. My job was to program the two-dimensional fast Fourier transform (FFT) using C and the Message Passing Interface...
Adobe Flash Professional CS6 Classroom in a Book
Adobe Flash Professional CS6 Classroom in a Book

 

Adobe Flash Professional CS6 provides a comprehensive authoring environment for creating interactive and media-rich applications. Flash is widely used to create engaging projects integrating video, sound, graphics, and animation. You can create original content in Flash or import assets from other Adobe...

Integrated Business Processes with ERP Systems
Integrated Business Processes with ERP Systems
As more and more businesses around the world adopt enterprise systems, it becomes increasingly important for students to develop a more process-centric perspective that refl ects the realities of the modern business environment in which they will work. Because business operations and enterprise systems are so tightly...
Amazing Java: Learn Java Quickly!
Amazing Java: Learn Java Quickly!


Do you know Java is being used worldwide? These days it is difficult to find a platform not running on Java. Their uses begin from commercial e-commerce website to Android apps, from desktop applications to games, from financial applications to scientific applications, from J2ME applications to open source library
...

ASP.NET by Example
ASP.NET by Example
ASP developers need to understand how ASP.NET can help them solve business problems better than any prior product. ASP.NET by Example is designed to provide a "crash course" on ASP.NET and quickly help the reader start using this new technology. As part of the By Example series, this book approaches ASP.NET in an easy-to-use tutorial...
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

Wireless Home Networking For Dummies
Wireless Home Networking For Dummies
Wireless home networks are better than ever! The emergence of new industry standards has made them easier, more convenient, less expensive to own and operate. Still, you need to know what to look for (and look out for), and the expert guidance you’ll find in Wireless Home Networks For Dummies, 3rd Edition helps you ensure that your...
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

Blender 2.5 HOTSHOT
Blender 2.5 HOTSHOT

With Blender 2.5 Hotshot you will take a tour around Blender 3D tools and discover the tight integration between them by working on projects covering many aspects of computer image generation, modeling, lighting, compositing, animation, and the game engine.

Using a projects based approach you will learn fun and challenging...

unlimited object storage image
Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy