We almost never read forewords or introductions, so we’ll try to be as brief as
possible. There were several reasons for writing this book. As time has gone by
and FileMaker has evolved into a more sophisticated development tool, the
need for more advanced FileMaker reference materials has grown as well. We
felt that while...
The chances are that more of your WordPress website visitors are using mobiles, or more clients are demanding responsive or mobile sites. If you can use WordPress to build mobile-friendly sites you can win more business from clients and more traffic for your site.
"WordPress Mobile Web Development Beginner's Guide"...
At least one-third of the people we know are introverts. They are the ones who prefer listening to speaking, reading to partying; who innovate and create but dislike self-promotion; who favor working on their own over brainstorming in teams. Although they are often labeled "quiet," it is to introverts that we owe many of the great...
Fundamentals of Engineering Programming with C and Fortran is a beginner's guide to problem solving with computers that shows how to quickly prototype a program for a particular engineering application. The book's side-by- side coverage of C and Fortran is unique. Myler emphasizes the importance of developing programming skills in C...
Are some areas of fast Fourier transforms still unclear to you? Do the notation and vocabulary seem inconsistent? Does your knowledge of their algorithmic aspects feel incomplete? The fast Fourier transform represents one of the most important advancements in scientific and engineering computing. Until now, however, treatments have been...
In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.
"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...
"An engaging, highly readable survey of the sophisticated methods of persuasion we encounter in various situations. From television to telemarketing and from self-deception to suicide cults, Levine takes a hard look at all the ways we attempt to persuade each other--and how and why they work (or don't). . . . The next time you wonder...
“If I was going to start a new business today I would be sure to study and pay close attention to Kevin Ready’s new book, Startup. His wisdom, experience, and his self-effacing and honest writing make this a real gem for aspiring entrepreneurs and business people of all kinds.”
—Bob Beaudine,...
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...
Recently, a new class of heuristic techniques, the swarm intelligence has
emerged. In this context, more recently, biologists and computer scientists in
the field of “artificial life” have been turning to insects for ideas that can be
used for heuristics. Many aspects of the collective activities of social insects,...
Approaches to building machines that can learn from experience abound - from connectionist learning algorithms and genetic algorithms to statistical mechanics and a learning system based on Piaget's theories of early childhood development. This monograph describes results derived from the mathematically oriented framework of computational...
Complex interacting networks are observed in systems from such diverse areas as physics, biology, economics, ecology, and computer science. For example, economic or social interactions often organize themselves in complex network structures. Similar phenomena are observed in traffic flow and in communication networks as the internet. In...