This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software...
Bladder Pain Syndrome: A Guide for Clinicians provides a comprehensive update in the pathophysiology, epidemiology, terminology, evaluation and treatment of patients with pelvic pain perceived to be related to the urinary bladder. The volume covers the tremendous evolution during the last decade in our understanding of pain...
Your knowledge of HTML and CSS is a door to the world of mobile web apps thanks to this handy guide to Sencha Touch. Through code and screenshots it gives you the practical know-how to use the framework.
Overview
Learn to develop web applications that look and feel native on Apple iOS, Google Android,...
Securely deploy iPads and iPhones on corporate networks
Seamlessly integrate iPads and iPhones into your company's IT systems using the detailed instructions contained in this practical book. iPad & iPhone Administrator's Guide shows you how to use iPads and iPhones as business devices and manage them tightly...
To be successful, the portable electronic designer must view the prod-
uct design process as a part of a broader process of product development.
While the insights and creativity of the individual designer are critical
in creating a successful product, the designer must be prepared to
engage through every phase of product development...
Eagerly anticipated by millions of programmers, Java SE 8 is the most important Java update in many years. The addition of lambda expressions (closures) and streams represents the biggest change to Java programming since the introduction of generics and annotations.
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...
Visual Studio 2010 is an exciting version for the Visual Basic language, which reaches a double
digit version in Visual Basic 10. This is a phenomenal achievement for a programming language,
and it demonstrates the enormous utility that the language continues to provide, year after year.
Visual Basic has always been a premier tool for...
Learning Classifier Systems (LCS) [Holland, 1976] are a machine learning technique which combines evolutionary computing, reinforcement learning, supervised learning or unsupervised learning, and heuristics to produce adaptive systems. They are rulebased systems, where the rules are usually in the traditional production system form of “IF...
Rapid advances in microelectronic integration and the advent of Systems-on-Chip have fueled the need for high-level synthesis, i.e., an automated approach to the synthesis of hardware from behavioral descriptions. SPARK: A Parallelizing Approach to the High - Level Synthesis of Digital Circuits presents a novel approach...