Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows 7 Device Driver (Addison-Wesley Microsoft Technology Series)
Windows 7 Device Driver (Addison-Wesley Microsoft Technology Series)

This book provides the technical guidance and understanding needed to write device drivers for the new Windows 7 Operating System. It takes this very complex programming development, and shows how the Windows Driver Framework has greatly simplified this undertaking. It explains the hardware and software architecture you must...

Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

30 Arduino Projects for the Evil Genius
30 Arduino Projects for the Evil Genius

30 Ways to Have Some Computer-Controlled Evil Fun!

This wickedly inventive guide shows you how to program and build a variety of projects with the Arduino microcontroller development system. Covering Windows, Mac, and Linux platforms, 30 Arduino Projects for the Evil Genius gets you up to speed with the simplified C...

Rendering HTML5 Illustration
Rendering HTML5 Illustration

Tags are used in HTML5 to place and organize content at a level that is descriptive. This does not mean that the page will look good. Presentation of content on the page is controlled using Cascading Style Sheets Level 3, or CSS3, in HTML5.

There are times, however, when you need to present graphics, too. Typically, HTML...

Texturing and Modeling, Third Edition: A Procedural Approach
Texturing and Modeling, Third Edition: A Procedural Approach

What is a realistic image? This is an age-old question in art, and a contemporary question in computer graphics. This book provides a modern answer involving the computer and a new definition of realism.

The classic definition of realism has been veridical realism. Does the picture pass the comparison test? That is, would an...

Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs
Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs

Doug and I have known each other online for many years. We both became Microsoft MVPs about 10 years ago, and have been friends ever since. Both of us had been writing for magazines for years. Although we’d been talking about writing a book together for about five years now, there had always been an impediment, usually work, and...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)

As I write this, Java is just beginning its second decade. Unlike many other computer languages whose influence begins to wane over the years, Java’s has grown stronger with the passage of time. Java leapt to the forefront of Internet programming with its first release. Each subsequent version has solidified that position. Today,...

Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks
Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks

Presentations: We´ve all sat through them, wondering why we´re there; or we´ve given them, wondering whether the audience cares. This is a book about how to make presentations effective and therefore more interesting to the audience members.

Years ago, I was at a conference where one of the most...

Getting StartED with Netbooks
Getting StartED with Netbooks

Getting StartED with Netbooks broadly targets consumers at a pivotal moment in the explosive growth of the MID/Netbook/UMPC market. We intend to create value for this group by providing an indispensable, "Consumer Reports Meets Whole Earth Catalog" sort of information aggregation.

For this project, timing and tone...

Java™ for Programmers (2nd Edition) (Deitel Developer Series)
Java™ for Programmers (2nd Edition) (Deitel Developer Series)

Welcome to Java—the world’s most widely used computer programming language. In this book, you’ll learn object-oriented programming—today’s key programming methodology.

You’ll create and work with many software objects in this text.

Java is the preferred language for meeting many...

Result Page: 484 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 467 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy