Install WordPress and go beyond blogging
WordPress is so flexible that developers are now tapping it to create robust applications for content, contact, and e-mail management. Whether you're a casual blogger or programming pro, this comprehensive guide covers WordPress from the basics through advanced application development. Learn how...
Microsoft Outlook 2010 Inside Out
You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...
Hacking Vim 7.2
Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.
This book contains examples that cover...
x86 Instruction Set Architecture
The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in...
Computability Theory: An Introduction to Recursion Theory
The study of the class of computable partial functions (i.e., recursive partial functions)
stands at the intersection of three fields: mathematics, theoretical computer science,
Mathematically, computability theory originates from the concept of an algorithm.
It leads to a classification of functions according...
Fiber Optics: Physics and Technology
Telephone, telefax, email and internet - the key ingredient of the inner workings is the conduit: the line which is designed to carry massive amounts of data at breakneck speed. In their data-carrying capacity optical fiber lines beat other technologies (copper cable, microwave beacons, satellite links) hands down, at least in the long...
Advanced Statistical Steganalysis (Information Security and Cryptography)
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical...
|Result Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next |