 |
|
|
 haXe 2 Beginner's Guide
Remember the olden days?
I vaguely remember this odd box called a computer gradually conquering corners of my living room and bedroom. Can you recall those times? We would "use a computer" for some specific tasks, such as writing a letter.
The term computer was quite popular back then. Now, the word is no... |  |  Java Programming: From The Ground Up
Java Programming: From the Ground Up begins with the fundamentals of programming,
moves through the object-oriented paradigm, and concludes with an introduction
to graphics and event-driven programming. The broad coverage of topics as well as
the modularity of the text makes the book suitable for both introductory and intermediatelevel... |  |  Principles of Computer Organization and Assembly Language
This is a book on the organization and architecture of theJava Virtual Machine(JVM), the
software at the heart of the Java language and is found inside most computers,Web browsers,
PDAs, and networked accessories. It also covers general principles of machine organization and
architecture, with llustrations from other popular (and... |
|
 Cryptography and Network Security: Principles and Practice (5th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |  |  C++ for Everyone
This book is an introduction to C++ and computer programming that focuses on the
essentials—and on effective learning. The book is designed to serve a wide range of
student interests and abilities and is suitable for a first course in programming for
computer scientists, engineers, and students in other disciplines. No prior... |  |  Systems and Software Verification: Model-Checking Techniques and Tools
Model checking is a powerful approach for the formal verification of software. It automatically provides complete proofs of correctness, or explains, via counter-examples, why a system is not correct. Here, the author provides a well written and basic introduction to the new technique. The first part describes in simple terms the theoretical... |
|
 Representations and Techniques for 3D Object Recognition & Scene Interpretation
3D scene understanding and object recognition are among the grandest challenges in computer
vision. A wide variety of techniques and goals, such as structure from motion, optical flow, stereo,
edge detection, and segmentation, could be viewed as subtasks within scene understanding and
recognition. Many of these applicable methods are... |  |  Data Structures & Problem Solving Using Java
Tpreface his book is designed for a two-semester sequence in computer science,
beginning with what is typically known as Data Structures and continuing
with advanced data structures and algorithm analysis. It is appropriate for the
courses from both the two-course and three-course sequences in “B.1 Introductory
Tracks,” as... |  |  Security Strategy: From Requirements to Reality
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and... |
|
| Result Page: 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 |