Home | Amazing | Today | Tags | Publishers | Years | Search 
History Teaching with Moodle 2
History Teaching with Moodle 2

Moodle is an e-learning platform that has transformed the way in which many teachers deliver their subject to students. Teachers who create courses for students can now build online versions with choices and possibilities that might not previously have existed. It has made this transition to online courses a straightforward and...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)
Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)

Over the course of the past twenty years I have learned many things relevant to this book while working in high-energy physics. As everyone in this field in the yearly to mid-90s, I was analyzing experimental data collected by particle colliders using the FORTRAN programming language. Then, gradually, I moved to C++ coding following...

Elements of ML Programming, ML97 Edition (2nd Edition)
Elements of ML Programming, ML97 Edition (2nd Edition)

I became interested in ML programming when I taught CS109, the introduc- tory Computer Science Foundations course at Stanford, starting in 1991. ML was used by several of the instructors of this course, including Stu Reges and Mike Cleron, to introduce concepts such as functional programming and type systems. It was also used for the...

Digital Painting Fundamentals with Corel Painter 12
Digital Painting Fundamentals with Corel Painter 12

I’m delighted that Cengage Learning invited me to write this third edition of Digital Painting Fundamentals with Corel Painter. The earlier books, for versions X (pronounced “ten”) and 11 (pronounced “eleven”) were greeted with very positive responses from users and critics, not just my friends and...

Fedora Bible 2011 Edition: Featuring Fedora Linux 14
Fedora Bible 2011 Edition: Featuring Fedora Linux 14

With the Fedora Linux operating system and the instructions in this book, you can transform your PC into a safe, powerful, and free computer system. Starting with Fedora, you can easily replace (or coexist with) Microsoft Windows on your everyday desktop computer. You can also configure your computer to share your files, printers, Web pages,...

Modern Aspects of Electrochemistry 16
Modern Aspects of Electrochemistry 16

This volume of the Modern Aspects of Electrochemistry series con- tains six chapters: four are on topics of current fundamental interest in the subject and two deal with more technological aspects of electrochemistry.

Writing such a chapter on solid metal electrodes is a challenge when, at every moment, the latest...

Java Programming
Java Programming

Java Programming, Fifth Edition provides the beginning programmer with a guide to developing applications using the Java programming language. Java is popular among professional programmers because it can be used to build visually interesting graphical user interface (GUI) and Web-based applications. Java also provides an excellent...

Mastering IBM i: The Complete Resource for Today's IBM i System
Mastering IBM i: The Complete Resource for Today's IBM i System

The IBM i operating system running on IBM Power Systems is a platform in transition. Many think the system is obsolete, largely due to its infamous green screen. Nothing, though, could be further from the truth. When IBM embraced open-source software such as Linux, MySQL, and Zend PHP, the system cemented a formidable position in...

Phase Transitions in Machine Learning
Phase Transitions in Machine Learning

From its inception in the 1930s, the rich and vigorous field of computer science has been concerned with the resources, both in time and in memory, needed to carry out a computation. A number of fundamental theorems were discovered that resorted to a worst-case analysis. The central question was whether a given algorithm could be...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Programming Reactive Extensions and LINQ
Programming Reactive Extensions and LINQ

Right now, we as programmers are at an impasse—a transition period between the well-understood world of imperative programming, and a world that is increasingly at odds with this model. In the ’80s, everything was simple: one machine, one thread, no network.

CPUs are now scaling horizontally, adding more and more...

Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy