![](https://www.pdfchm.net/pic/empty.gif) |
|
|
![](https://pic.pdfchm.net/empty.gif) UML For The IT Business Analyst, Second Edition
Today, information-technology business analysts are often working on object-oriented (OO), Unified Modeling Language (UML) projects, yet they have a long way to go to exploit the technology beyond the adoption of use cases (just one part of the UML). This book explains how, as an IT business analyst, you can pull together all of the UML tools... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Ajax Programming for the Absolute Beginner
Learn Ajax the easy way! If you are new to programming with Ajax and are looking for a solid introduction, this is the book for you. Developed by computer science instructors, books in the ?for the absolute beginner? series teach the principles of programming through simple game creation. You will acquire the skills that you need for more... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your... |
|
![](https://pic.pdfchm.net/empty.gif) Pattern Recognition, Fourth Edition
This book considers classical and current theory and practice, of supervised, unsupervised and semi-supervised pattern recognition, to build a complete background for professionals and students of engineering. The authors, leading experts in the field of pattern recognition, have provided an up-to-date, self-contained volume encapsulating... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Computer Evidence: Collection and Preservation
As computers and data systems continue to evolve, they expand into every facet of our personal and business lives. Never before has our society been so information and technology driven. Because computers, data communications, and data storage devices have become ubiquitous, few crimes or civil disputes do not involve them in some way. This... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Behavioral Mathematics for Game AI
Human behavior is never an exact science, making the design and programming of artificial intelligence that seeks to replicate human behavior difficult. Usually, the answers cannot be found in sterile algorithms that are often the focus of artificial intelligence programming. However, by analyzing why people behave the way we do, we can break... |
|
|
Result Page: 1584 1583 1582 1581 1580 1579 1578 1577 1576 1575 1574 1573 1572 1571 1570 1569 1568 1567 1566 |