Home | Amazing | Today | Tags | Publishers | Years | Search 
OpenLayers 2.10 Beginner's Guide
OpenLayers 2.10 Beginner's Guide

Web mapping is the process of designing, implementing, generating, and delivering maps on the World Wide Web and its products. OpenLayers is a powerful, community driven, open source, pure JavaScript web mapping library. With it, you can easily create your own web map mashup using WMS, Google Maps, and a myriad of other map backends....

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

WordPress 3 Plugin Development Essentials
WordPress 3 Plugin Development Essentials

By picking up this book, there's a good chance that you fall into one of two categories: an existing WordPress user / hobbyist programmer who is interested in building your own plugins for the platform, or a seasoned developer who is new to WordPress and need to complete a project for a client.

In either case, this book is...

Adaptive Multimedia Retrieval. Understanding Media and Adapting to the User: 7th International Workshop
Adaptive Multimedia Retrieval. Understanding Media and Adapting to the User: 7th International Workshop

This book contains a selection of the revised contributions that were initially submitted to the International Workshop on Adaptive Multimedia Retrieval (AMR 2009). The workshop was organized by the Universidad Nacional de Educaci ´on a Distancia (UNED) in Madrid, Spain, during September 24–25, 2009.

The goal of the AMR...

SharePoint 2010 Web Parts in Action
SharePoint 2010 Web Parts in Action

I really love working with SharePoint! I’ve been doing it full-time for the last half decade, including lots of late nights and weekends. One area that I’ve found particularly interesting is Web Parts. I like the nature of a Web Part since it can act as a standalone application inside the powerful SharePoint platform—or it...

iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps
iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps

Our goal as programmers is to solve problems. Sometimes the problems are hard, sometimes they’re easy, and sometimes they’re even fun. Maybe they’re not even “problems” in the colloquial sense of the word, but we are there to solve them.

Our goal as authors is to help you solve your problems...

Robot Vision: Video-based Indoor Exploration with Autonomous and Mobile Robots
Robot Vision: Video-based Indoor Exploration with Autonomous and Mobile Robots

The book is intended for advanced students in physics, mathematics, computer science, electrical engineering, robotics, engine engineering and for specialists in computer vision and robotics on the techniques for the development of vision-based robot projects. It focusses on autonomous and mobile service robots for indoor work, and teaches...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010

Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Data Management and Query Processing in Semantic Web Databases
Data Management and Query Processing in Semantic Web Databases

The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which...

25 Recipes for Getting Started with R
25 Recipes for Getting Started with R

R is a powerful tool for statistics, graphics, and statistical programming. It is used by tens of thousands of people daily to perform serious statistical analyses. It is a free, open source system whose implementation is the collective accomplishment of many intelligent, hard-working people. There are more than 2,000 available add-ons, and R...

Result Page: 1826 1825 1824 1823 1822 1821 1820 1819 1818 1817 1816 1815 1814 1813 1812 1811 1810 1809 1808 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy