Home | Amazing | Today | Tags | Publishers | Years | Search 
Technical Java: Applications for Science and Engineering
Technical Java: Applications for Science and Engineering
If you want to use Java todevelop scientific or engineering programs, Technical Java is the Java guide you’vebeen searching for. Using real-life examples, expert scientific programmerGrant Palmer shows how to build powerful, versatile, and flexible software forvirtually any technical application. Whether you’re moving from FORTRAN,C, or...
Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

iPod & iTunes (Missing Manuals)
iPod & iTunes (Missing Manuals)

Whether it's the ultra-thin, pocket-sized iPod or the vast music library known as iTunes, it seems like everyone is relying on these marvels of technology for their musical needs. CDs and cassettes? They're so twentieth century!

But like any cutting-edge technology, improvements come fast and furious. To keep
...

Interconnection Networks (Computer Architecture and Design)
Interconnection Networks (Computer Architecture and Design)
Interconnection networks are becoming increasingly pervasive in many different applications,
with the operational costs and characteristics of these networks depending considerably
on the application. For some applications, interconnection networks have been
studied in depth for decades. This is the case for telephone networks,
...
Tomes of Delphi: Win32 Core API Windows 2000
Tomes of Delphi: Win32 Core API Windows 2000
The Windows programming environment. No other operating system in history has caused
so much controversy or confusion among the programming industry. Of course, no other
operating system in history has made so many millionaires either. Like it or not, Windows
is here to stay. It’s hard to ignore such a large user base, and
...
Unified Modeling Language Reference Manual
Unified Modeling Language Reference Manual

“If you are a serious user of UML, there is no other book quite like this one. I have been involved with the UML specification process for some time, but I still found myself learning things while reading through this book—especially on the changes and new capabilities that have come with UML.”

...
C++ Primer
C++ Primer

Quite a few changes have occurred between the second and third editions of C++ Primer. Most notably, C++ has undergone international standardization, which has not only added new features to the language, such as exception handling, run-time type identification, namespaces, a built-in Boolean data type, and a new cast notation, but has...

The Tomes of Delphi: Algorithms and Data Structures
The Tomes of Delphi: Algorithms and Data Structures
Although there are numerous books on algorithms in the bookstores, few of
them go beyond the standard Computer Science 101 course to approach algorithms
from a practical perspective. The code that is shown in the book is to
illustrate the algorithm in question, and generally no consideration is given to
real-life,
...
Server Component Patterns: Component Infrastructures Illustrated with EJB (Wiley Software Patterns Series)
Server Component Patterns: Component Infrastructures Illustrated with EJB (Wiley Software Patterns Series)
This book is about component-based development on the server. Examples
for such technologies are Enterprise JavaBeans (EJB), CORBA
Components (CCM) or Microsoft’s COM+, which have all gained
widespread use recently. To build successful applications based on
these technologies, the developer should have an understanding of
...
Advanced Database Technology and Design (Artech House Computer Library)
Advanced Database Technology and Design (Artech House Computer Library)
Since computers were introduced to automate organization management,
information system evolution has influenced data management considerably.
Applications demand more and more services from information stored in
computing systems. These new services impose more stringent conditions on
the currently prevailing client/server
...
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

How to Listen to Modern Music: Without Earplugs
How to Listen to Modern Music: Without Earplugs
The story goes that the legendary English conductor Sir Thomas Beecham was asked if he had conducted any music by Stockhausen. The reply came, "No, but I once trod in some."  

Like all genuinely serious subjects, modern music is ripe for humour. Musicians everywhere have stories to tell about the strange and bizzare things
...
Result Page: 468 467 466 465 464 463 462 461 460 459 458 457 456 455 454 453 452 451 450 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy