|
|
|
|
Programming Language Processors in Java: Compilers and InterpretersThis book provides a gently paced introduction to techniques for implementing programming languages by means of compilers and interpreters, using the object-oriented programming language Java. The book aims to exemplify good software engineering principles at the same time as explaining the specific techniques needed to build compilers and... | | Geocomputation
GeoComputation (GC) is a follow-on revolution that is occurring after the
introduction of geographical information systems (GIS). It is expected to gather
speed and momentum in the first decade of the 21st century. The rationale
behind this latest revolution is quite simple. When we have finished creating our
GIS databases, set up our... | | Computer Telephony DemystifiedReshape your world with computer telephony
There’s no stopping the computer telephony (CT) revolution. Everywhere you look, CT is replacing the existing telephony infrastructure with products, systems, and solutions based on off-the-shelf computer technology.
If you’re ready to take advantage of customizable telephony... |
|
Applied XML SolutionsApplied XML Solutions presents a series of projects rather than a tutorial format. The projects follow a natural progression from simple to complex. Within each chapter, helpful sidebars highlight XML fundamentals necessary to understand the project in progress. This will save readers' time having to look to another source if they forget a key... | | Electric Refractory Materials
This book provides a state-of-the-art overview of electric refractory materials as exotic materials
(i.e., metallic and semiconducting refractory materials) from fundamental properties to application
in a wide variety of electronics. The metallic ceramics or metalloids are the transition metal
carbides, nitrides, and diborides of... | | The International Handbook of Computer SecurityThis book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection... |
|
|
|
|
Result Page: Previous 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Next |