|
|
|
|
|
Simply Scheme: Introducing Computer ScienceAn introductory-level text for students who are not majoring in computer science as well as for computer science majors with no prior programming experience, Simply Scheme teaches computer science from a functional/symbolic point of view. It provides a solid platform from which students can go on to study the seminal work Structure and... | | SQL and Relational Theory: How to Write Accurate SQL Code
This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course—
using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things,
experience gained from teaching live seminars based on the first edition.
One... | | Mastering Lumion 3D
Master the art of creating real-time 3D architectural visualizations using Lumion 3D
About This Book
-
Create professional architectural visualizations in seconds using real-time technology
-
Learn the inbuilt Lumion effects to enhance your project to an expert level
-
Covers...
|
|
Pro .NET 2.0 Windows Forms and Custom Controls in C#Four years after the .NET Framework first hit the programming scene, smart client applications still refuse to die.
This is significant because when .NET first appeared, all too many people assumed it was about to usher in a new world of Web-only programming. In fact, for a short time Microsoft’s own Web site... | | Ext JS in Action
Summary
Ext JS in Action, Second Edition teaches Ext JS from the ground up. You'll start with a quick overview of the framework and then explore the core components by diving into complete examples, engaging illustrations, and crisp, straightforward explanations. You'll feel like you have an expert... | | Investigative Data Mining for Security and Criminal Detection, First EditionInvestigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... |
|
Advanced Methods for Knowledge Discovery from Complex DataThis book brings together research articles by active practitioners and leading researchers reporting recent advances in the field of knowledge discovery. An overview of the field, looking at the issues and challenges involved is followed by coverage of recent trends in data mining. This provides the context for the subsequent chapters on methods... | | | | |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |