Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Hematopathology in Oncology (Cancer Treatment and Research)
Hematopathology in Oncology (Cancer Treatment and Research)
Hematologist/oncologists rely heavily upon the discipline of hematopathology for the care and management of their patients. Whether interpreting a lymph node or bone marrow biopsy, directing a high throughput automated hematology laboratory, or translating testing modalities from the research bench to the clinical laboratory,...
Java I/O
Java I/O
Because it doesn't provide a printf() function like C/C++, some developers think Java isn't up to snuff with files and streams. Author Rusty Harold Elliotte argues against this notion in Java I/O, a book that shows how Java's stream support can help simplify network programming, internationalization, and even compression and...
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing...
SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

The Kindle Fire Pocket Guide
The Kindle Fire Pocket Guide

This affordable and engaging guide is packed with practical information to you help you get the most from your Kindle Fire. Amazon Kindle expert Scott McNulty offers plenty of tips and pointers for using Amazon's trim tablet, including how to download apps, read books, take advantage of the Amazon cloud, and browse...

Reliable Knowledge Discovery
Reliable Knowledge Discovery
With the rapid development of the data mining and knowledge discovery, a key issue which could significantly affect the real world applications of data mining is the reliability issues of knowledge discovery. It is natural that people will ask if the discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
Learn Java for Android Development
Learn Java for Android Development

Android development is hot, and many programmers are interested in joining the fun. However, because this technology is based on Java, you should first obtain a solid grasp of the Java language and its foundational APIs to improve your chances of succeeding as an Android app developer. After all, you will be busy learning the architecture of...

Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Gain a deeper understanding of how Raspberry Pi works to get the results you want right in the palm of your hand. This book helps you understand the right connections and software to drive your Raspberry Pi into opening the worlds of programming, electronic experiments, system control, digital imaging, and the Internet of Things to you. ...
Among the Lowest of the Dead: The Culture of Capital Punishment (Law, Meaning, and Violence)
Among the Lowest of the Dead: The Culture of Capital Punishment (Law, Meaning, and Violence)
A book about a subject as controversial and fl uid as the death penalty is inevitably a bucket pulled from a moving stream. No sooner is it published than readers—and the author— begin to wonder whether the water in the bucket still represents the whole river.

Has this book about a “slow, costly and ineffi cient”
...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy