Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Silverlight 5 Building Rich Enterprise Dashboards
Microsoft Silverlight 5 Building Rich Enterprise Dashboards
Welcome, to the exciting world of building Rich Enterprise Dashboards with Silverlight. Throughout this book, you will learn how to harness the power of the Silverlight 5.0 platform to build amazing Dashboards. This book goes beyond just showing the nuts and bolts of learning Silverlight and showcases how to create amazing...
Programming Your Home: Automate with Arduino, Android, and Your Computer (Pragmatic Programmers)
Programming Your Home: Automate with Arduino, Android, and Your Computer (Pragmatic Programmers)
Welcome to the exciting, empowering world of home automation! If you have ever wanted your home to do more than just protect you against the outside elements and want to interface it to the digital domain, this book will show you how. By demonstrating several easy-to-build projects, you will be able to take the skills you learned from this...
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Automated Deduction in Geometry: 8th International Workshop, ADG 2010, Munich, Germany
Automated Deduction in Geometry: 8th International Workshop, ADG 2010, Munich, Germany

From July 22 to July 24, 2010, the Technische Universit¨at M¨unchen, Germany, hosted the eighth edition of the now well-established ADG workshop dedicated to Automatic Deduction in Geometry. From the first edition, which was held in Toulouse in 1996, to ADG 2010, a slow mutation has taken place. The workshop that was formerly...

Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Innovative Computing Technology: First International Conference, INCT 2011, Tehran, Iran
Innovative Computing Technology: First International Conference, INCT 2011, Tehran, Iran

We are pleased to publish the significant papers accepted in the First International Conference on Innovative Computing Technology (INCT 2011).

The production and the use of newer computing devices and platforms has led to a better understanding of the emerging computing paradigms. For many decades, computing systems have...

Design and Prototyping for Drupal
Design and Prototyping for Drupal

If you’re reading this book, you’re probably a web designer who has heard of Drupal, wants to get started with it, and may have even tried it out a couple of times. And you might be frustrated because even if you’re used to code, Drupal has thrown you a major learning curve that you hadn’t expected....

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Pro Android 4 (Professional Apress)
Pro Android 4 (Professional Apress)

Pro Android 4 shows you how to build real-world and fun mobile apps using the new Android SDK 4 (Ice Cream Sandwich), which unifies Gingerbread for smartphones, Honeycomb for tablets and augments further with Google TV and more. This Android 4 book updates the best selling Pro Android 3 and covers everything...

Enterprise JavaBeans (Java Series)
Enterprise JavaBeans (Java Series)
This book is about Enterprise JavaBeans 1.1 and 2.0 the second and third versions of the Enterprise JavaBeans specification. Just as the Java platform has revolutionized the way we think about software development, Enterprise JavaBeans has revolutionized the way we think about developing mission-critical enterprise...
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

Result Page: 566 565 564 563 562 561 560 559 558 557 556 555 554 553 552 551 550 549 548 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy