Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lift Application Development Cookbook
Lift Application Development Cookbook

Over 50 practical recipes to build web applications using Lift, the most secure web framework available

Overview

  • Lift made easy with step-by-steps recipes written by a developer for developers
  • Practical examples covering topics from basic to advanced levels
  • Learn to use...
Microsoft Skype For Business 2016 Keyboard Shortcuts For Windows (Shortcut Matters)
Microsoft Skype For Business 2016 Keyboard Shortcuts For Windows (Shortcut Matters)

Get connected without delay.

Skype For Business connects you with your friends, family, coworkers and many others cost effectively. The design of the program makes using mouse for it okay but it is better when combined with essential keyboard shortcuts. Skype users need keyboard shortcuts so as to use the devices well and flow in...

Computer Vision: A Modern Approach
Computer Vision: A Modern Approach

This extraordinary book gives a uniquely modern view of computer vision. Offering a general survey of the whole computer vision enterprise along with sufficient detail for readers to be able to build useful applications, this book is invaluable in providing a strategic overview of computer vision. With extensive use of probabalistic...

Pro Visual Studio Team System with Team Edition for Database Professionals, Second Edition
Pro Visual Studio Team System with Team Edition for Database Professionals, Second Edition
It is clear that Visual Studio Team System is the future of development from Microsoft’s perspective. Development is no longer a personal pursuit by one developer in a darkened room; it is a collective effort by a team of peers. VSTS supports this broader vision by providing a complete collaboration platform for the entire project team. VSTS...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Autodesk Revit Architecture 2010 in Practice
Autodesk Revit Architecture 2010 in Practice

Autodesk Revit® Architecture® software provides building information modeling (BIM) data that allows you to design buildings with modeling and drafting elements. This book provides basic, step-by-step instructions for getting started and using the Revit Architecture software or for refreshing your Revit skill. It covers only the...

Advances in Grid and Pervasive Computing: 6th International Conference
Advances in Grid and Pervasive Computing: 6th International Conference

the emerging areas of grid computing, cloud computing, and pervasive computing. The 6th International Conference on Grid and Pervasive Computing, GPC 2011, was held in Oulu, Finland, during May 11-13, 2011. This volume contains the full papers that were presented at the conference. This program was preceded by one day of workshops, a...

Rhodes Framework for Android(TM) Platform and BlackBerry® Smartphones (SpringerBriefs in Computer Science)
Rhodes Framework for Android(TM) Platform and BlackBerry® Smartphones (SpringerBriefs in Computer Science)

The Rhodes framework offers several advantages over other mobile frameworks. Some of the unique features of the Rhodes frameworks are as follows:

- The only smartphone framework to offer support for the Model View Controller pattern

- The only smartphone framework to offer support for the Object-Relational manager

...
A Political Theory of Post-Truth
A Political Theory of Post-Truth
This book combines political theory with media and communications studies in order to formulate a theory of post-truth, concentrating on the latter’s preconditions, context, and functions in today’s societies. Contrary to the prevalent view of post-truth as primarily manipulative, it is argued that post-truth is, instead, a collusion...
Six Sigma and Beyond: Statistics and Probability, Volume III
Six Sigma and Beyond: Statistics and Probability, Volume III
This text explains the tools of statistics and how to apply them effectively to improve processes and profitability in an organization, and also delineates the importance of collecting, analyzing, and interpreting data.

Researchers and professionals in all walks of life need to use the many tools offered by the statistical world, but...

Don't Give Me That Attitude!: 24 Rude, Selfish, Insensitive Things Kids Do and How to Stop Them
Don't Give Me That Attitude!: 24 Rude, Selfish, Insensitive Things Kids Do and How to Stop Them
Does Your Child Have Attitude?
  • Does your kid never take no for an answer and demand things go his way?
  • Do her theatrics leave you drained at the end of the day?
  • Are you resorting to bribes and threats to get your kid to do chores?
  • Does he cheat, complain, or blame others for his...
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
Solaris 8 System Administrator Exam Cram (Exam: 310-011, 310-012)
The perfect study companion for UNIX system professionals preparing for both Solaris 8 System Administrator exams. The book contains accurate and efficient coverage of the many new features of the Solaris 8 system including new support for Ipv6, LDAP, and DHCP, installs using Solaris Web Start, new Universal Disk Format (UDF) file system support,...
unlimited object storage image
Result Page: 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy