Home | Amazing | Today | Tags | Publishers | Years | Search 
The Mac OS X Command Line: Unix Under the Hood
The Mac OS X Command Line: Unix Under the Hood
Work More Quickly and Easily—and Learn Some New Tricks

The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major
...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
The Java(TM) 3D API Specification
The Java(TM) 3D API Specification
The Java 3D API, an exciting new part of the JavaMedia suite of APIs, enables the creation of three-dimensional graphics applications and Internet-based 3D applets. It gives developers high-level constructs for creating and manipulating 3D geometry and for building the structures used in rendering that geometry. With Java 3D, developers...
Parallel Scientific Computing and Optimization: Advances and Applications (Springer Optimization and Its Applications)
Parallel Scientific Computing and Optimization: Advances and Applications (Springer Optimization and Its Applications)
This work introduces new developments in the construction, analysis, and implementation of parallel computing algorithms. This book presents 23 self-contained chapters, including surveys, written by distinguished researchers in the field of parallel computing. Each chapter is devoted to some aspects of the subject: parallel algorithms for matrix...
The Rise of the Blogosphere
The Rise of the Blogosphere
In Consilience: The Unity of Knowledge, biologist Edward O. Wilson writes that a “balanced perspective cannot be acquired by studying disciplines in pieces but through pursuit of the consilience among them. Such unification will come hard. But I think it is inevitable. Intellectually it rings true, and it gratifies impulses that rise from the...
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in...

Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Microsoft Office Excel 2007 Formulas & Functions For Dummies (Computer/Tech)
Microsoft Office Excel 2007 Formulas & Functions For Dummies (Computer/Tech)
Make Excel do the math and make sense of your data

Use the Insert Function dialog box, array formulas and functions, and more

Excel 2007 has more than 500 built-in functions. This book looks at the top 150, so you can find out which ones will make your life easier. Want to...

Digital Color Image Processing
Digital Color Image Processing
Color information is gaining an ever-greater importance in digital image processing. Nevertheless, the leap to be mastered by the transition from scalar to vector-valued image functions is not yet generally addressed in most textbooks on digital image processing. The main goal of this book is to clarify the significance of vector-valued color image...
Charging Communication Networks
Charging Communication Networks
This book proposes that usage-based charging schemes are essential to generate the incentives necessary for efficient operation of multiservice networks. The rapid development of network technology is enabling sophisticated new services and applications which demand new charging models. The same technology provides the means to operate the right...
Embracing Insanity: Open Source Software Development
Embracing Insanity: Open Source Software Development
In this book, you will learn where the Open Source movement comes from and what motivates its adherents. You will be introduced to the culture that fuels the movement, as well as the personalities and organizations that promote its growth. You will also understand the strengths of the Open Source movement and how it changes the way in which...
PC Systems, Installation and Maintenance, Second Edition
PC Systems, Installation and Maintenance, Second Edition
Written in a straightforward, easy to read style, Rob Beales provides the knowledge and techniques needed to build, troubleshoot, and maintain personal computer systems.

Divided into three parts, Part 1 forms an introduction to digital computers, leading the reader through the various parts of a modern PC system,
...
Result Page: 1082 1081 1080 1079 1078 1077 1076 1075 1074 1073 1072 1071 1070 1069 1068 1067 1066 1065 1064 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy