Home | Amazing | Today | Tags | Publishers | Years | Search 
The Compiler Design Handbook: Optimizations & Machine Code Generation
The Compiler Design Handbook: Optimizations & Machine Code Generation

In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for...

Fuzzy Logic: A Spectrum of Theoretical & Practical Issues (Studies in Fuzziness and Soft Computing)
Fuzzy Logic: A Spectrum of Theoretical & Practical Issues (Studies in Fuzziness and Soft Computing)

This book exclusively surveys the active on-going research of the current maturity of fuzzy logic over the last four decades. Many world leaders of fuzzy logic have enthusiastically contributed their best research results into five theoretical, philosophical and fundamental sub areas and nine distinctive applications, including two PhD...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

Game Programming for Teens
Game Programming for Teens

Hey, reader. Thanks for reading and/or buying my book. I am really thankful for it.

What is programming? Programming, according to Dictionary.com, is ‘‘a set of coded instructions that enables a machine, especially a computer, to perform a desired sequence of operations.’’ In other words, programming allows...

Object-Oriented Analysis and Design (Undergraduate Topics in Computer Science)
Object-Oriented Analysis and Design (Undergraduate Topics in Computer Science)

At least some people reading the title of this book may wonder why there should be one more book on the topic of Object Oriented Analysis and Design (OOAD). The short answer to this question is that in our teaching of the subject for over a decade, we have not been able to find a suitable textbook on this topic at our respective...

CompTIA A+ 220-701 and 220-702 Practice Questions Exam Cram (4th Edition)
CompTIA A+ 220-701 and 220-702 Practice Questions Exam Cram (4th Edition)

Welcome to CompTIA A+ Practice Questions Exam Cram. The sole purpose of this book is to provide you with practice questions that are complete with answers and explanations to help you learn, drill, and review for the CompTIA A+ certification exam. The book offers many questions that will help you practice each exam objective and will help you...

Software and Compilers for Embedded Systems: 8th International Workshop, SCOPES 2004
Software and Compilers for Embedded Systems: 8th International Workshop, SCOPES 2004

This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in Amsterdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was referred to as the International Workshop on Code Generation for Embedded Systems. The first took place in 1994 in...

Joomla! 1.6 First Look
Joomla! 1.6 First Look

Joomla! is one of the most popular open source content management systems. It's powerful, it's relatively easy to learn, and it's freely available, which explains why over the last few years it's become the engine behind millions and millions of websites worldwide. In January 2011, the much awaited version 1.6 was released....

Taking Your iPhoto '11 to the Max (Technology in Action)
Taking Your iPhoto '11 to the Max (Technology in Action)

If you have this book in your hands, you’re a person who enjoys photography and wants to get more out of your photographs. You’re also probably at least somewhat familiar with Apple’s iPhoto application; maybe you’ve played around with it, but getting to know everything it can do seems daunting. Not to worry, this book...

Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

Result Page: 893 892 891 890 889 888 887 886 885 884 883 882 881 880 879 878 877 876 875 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy