Home | Amazing | Today | Tags | Publishers | Years | Search 
The New C Standard: A Cultural and Economic Commentary
The New C Standard: A Cultural and Economic Commentary

This book contains a detailed analysis of the International Standard for the C language,-3.1 excluding the library from a number of perspectives. The organization of the material is unusual in that it is based on the actual text of the published C Standard. The unit of discussion is the individual sentences from the C Standard (2022 of...

Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Joomla! 1.6: A User's Guide: Building a Successful Joomla! Powered Website (3rd Edition)
Joomla! 1.6: A User's Guide: Building a Successful Joomla! Powered Website (3rd Edition)

Joomla is an open source content management system (CMS) that anyone can download for free (see forge.joomla.org/sf/go/projects.joomla/frs). This makes it an ideal choice for small businesses. Don’t let the price tag fool you, though; Joomla is powerful and robust, and more big organizations are choosing to use open source software...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)

This book attempts to provide a unified overview of the broad field of data and computer communications. The organization of the book reflects an attempt to break this massive subject into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book emphasizes basic...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Computability Theory: An Introduction to Recursion Theory
Computability Theory: An Introduction to Recursion Theory

The study of the class of computable partial functions (i.e., recursive partial functions) stands at the intersection of three fields: mathematics, theoretical computer science, and philosophy.

Mathematically, computability theory originates from the concept of an algorithm. It leads to a classification of functions according...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Applied Interval Analysis
Applied Interval Analysis

This book is about guaranteed numerical methods based on interval analysis for approximating sets, and about the application of these methods to vast classes of engineering problems. Guaranteed means here that inner and outer approximations of the sets of interest are obtained, which can be made as precise as desired, at the cost of...

Microsoft Access 2010 VBA Macro Programming
Microsoft Access 2010 VBA Macro Programming

Database macro programming has changed enormously over the last 15 years, having gone from Access Basic macros to VBA. Another major change occurred with Office 95, when macros went to VBA modules in a separate environment accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special design window....

Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Result Page: 762 761 760 759 758 757 756 755 754 753 752 751 750 749 748 747 746 745 744 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy