|
|
|
|
Java, Java, Java, Object-Oriented Problem Solving (3rd Edition) This second edition of Java, Java, Java offers a robust, accessible, and flexible problem-solving perspective. The use of Unified Modeling Language (UML) diagrams throughout the text, strongly emphasizes object-oriented design. This book assists students and professionals with their most challenging problem as beginning programmers:... | | Ambient Intelligence: A Novel ParadigmIf the space around us could adapt to our needs and intentions, then our lives would be much simpler. We would have to spend less time on our daily chores, we would be more productive and, hopefully, we would live in a less worrisome and, most likely, more secure world.
Ideally, it would be great if we could live our lives... | | Quantum Computing and Communications: An Engineering ApproachQuantum computers will revolutionize the way telecommunications networks function.
Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment.... |
|
Jess in Action: Java Rule-Based SystemsA practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and ... | | CSS Cookbook, 2nd EditionAs the industry standard method for enriching the presentation of HTML-based web pages, Cascading Style Sheets (CSS) allow you to give web pages more structure and a more sophisticated look. But first, you have to get past CSS theory and resolve real-world problems.
For those all-too-common dilemmas that... | | Extreme Exploits: Advanced Defenses Against Hardcore HacksProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses... |
|
| | Deploying Cisco Voice over IP SolutionsIf you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in... | | The Book of IRC: The Ultimate Guide to Internet Relay ChatICQ and other new-fangled chat applications may get most of the press, but Internet Relay Chat (IRC) remains the Wild West of real-time online conversations. Populated by the most diverse collection of characters this side of the Mos Eisley cantina scene in Star Wars, IRC will keep you up late chatting with people all over the world. The... |
|
|
|
Result Page: 976 975 974 973 972 971 970 969 968 967 966 965 964 963 962 961 960 959 958 |