 |
|
 The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel ApplicationsIf you're looking to take full advantage of multi-core processors with concurrent programming, this practical book provides the knowledge and hands-on experience you need. The Art of Concurrency is one of the few resources to focus on implementing algorithms in the shared-memory model of multi-core processors, rather than just theoretical models or... |  |  Printing with Adobe Photoshop CS4Photoshop users:
Ever feel like your printer is letting you down?
Sick of seeing the bright, saturated tones of photos on your monitor turn into washed-out, drab prints?
Frustrated by the lack of resources on this essential process?
If the answer to any of these questions is yes, then you really need The... |  |  Pediatric Headaches in Clinical Practice
This book is a foundation for further study into childhood headache and serve as a quick, up-to-date reference for the recognition, diagnosis, basic understanding, evaluation and management of headache disorders in children and adolescents.
-
Covers primary headache disorders including migraine
-
Covers...
|
|
|
 Input, Output and Exceptions
Communication is vital. It is also potentially unreliable. This is true of human
communication, but also of communication between humans and computers, or equally
when one computer communicates with another across a network.
There are two fundamentally different ways of communicating with a Java program. In
this... |  |  Java in the Small
We have called this unit 'Java in the small' after atermcoined by DeRemer and Kron in a 1976 paper.This refers to the programming of the internal parts of programs, in particular the contentsofmethods.
The previous unit introduced the idea of objectscommunicating through the invocation of methods on objects. In this unit you will... |  |  Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
 Decomposition Methods for Differential Equations: Theory and ApplicationsDecomposition Methods for Differential Equations: Theory and Applications describes the analysis of numerical methods for evolution equations based on temporal and spatial decomposition methods. It covers real-life problems, the underlying decomposition and discretization, the stability and consistency analysis of the decomposition... |  |  Facilities Management Handbook, Fourth EditionComprehensive, authoritative up to date coverage of all aspects of facilities management
Now in this fourth edition, the Facilities Management Handbook has been fully updated from the acclaimed previous editions, continuing its status as an invaluable resource to those working in facilities... |  |  |
|
Result Page: Previous 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 Next |