 |
|
 Professional Microsoft Robotics Developer Studio (Wrox Programmer to Programmer)
Microsoft Robotics Developer Studio (MRDS) offers an exciting new wayto program robots in the Windows environment. With key portions of the MRDS code available in source form, it is readily extensible and offers numerous opportunities for programmers and hobbyists. This comprehensive book illustrates creative ways to use the tools and... |  |  Beginning SharePoint 2010 Development (Wrox Beginning Guides)
Discover how to take advantage of the many new features in SharePoint 2010
SharePoint 2010 is a significant leap forward from the 2007 release, and 'you will find that there are a ton of features built into the platform for you to leverage in your solution development. Because SharePoint is a broad platform that covers a... |  |  The Gale Encyclopedia of Science
Contains more than 2,000 entries ranging from short definitions to major overviews of concepts in all areas of science.
The Gale Encyclopedia of Science, Third Edition has been designed with ease of use and ready reference in mind.
• Entries are alphabetically arranged across six volumes, in a single sequence,... |
|
 Professional iPhone Programming with MonoTouch and .NET/C#
What .NET C# developers need to enter the hot field of iPhone apps
iPhone applications offer a hot opportunity for developers. Until the open source MonoTouch project, this field was limited to those familiar with Apple’s programming languages. Now .NET and C# developers can join the party. Professional iPhone... |  |  Hackers and Painters: Big Ideas from the Computer Age
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "
--from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham
We are living in the computer age, in a world increasingly designed and... |  |  Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |
|
 Queueing Modelling Fundamentals: With Applications in Communication Networks
Queueing analysis is a vital tool used in the evaluation of system performance. Applications of queueing analysis cover a wide spectrum from bank automated teller machines to transportation and communications data networks.
Fully revised, this second edition of a popular book contains the significant addition of a new chapter on... |  |  Lightroom 3: Streamlining Your Digital Photography Process
"I’ve worked my entire adult life in digital imaging, from managing high-volume production departments to running my own photography and printing businesses. And for many years, I’ve been teaching photographers how to be self-sufficient when it comes to working with their digital images.
Having used all major... |  |  ImageCLEF: Experimental Evaluation in Visual Information Retrieval
The creation and consumption of content, especially visual content, is ingrained into our modern world. This book contains a collection of texts centered on the evaluation of image retrieval systems. To enable reproducible evaluation we must create standardized benchmarks and evaluation methodologies. The individual chapters in this book... |
|
|
| Result Page: 864 863 862 861 860 859 858 857 856 855 854 853 852 851 850 849 848 847 846 |