Home | Amazing | Today | Tags | Publishers | Years | Search 
Apache Wicket Cookbook
Apache Wicket Cookbook

Apache Wicket is one of the most famous Java web application frameworks. Wicket simplifies web development and makes it fun. Are you bored of going through countless pages of theory to find out how to get your web development done? With this book in hand, you don't need to go through hundreds of pages to figure out how you will actually...

Data Mining with R: Learning with Case Studies
Data Mining with R: Learning with Case Studies

The versatile capabilities and large set of add-on packages make R an excellent alternative to many existing and often expensive data mining tools. Exploring this area from the perspective of a practitioner, Data Mining with R: Learning with Case Studies uses practical examples to illustrate the power of R and data...

E-Business Innovation and Process Management (Advances in E-Business Research)
E-Business Innovation and Process Management (Advances in E-Business Research)

With the advent of e-business, organizations have been fundamentally changing the way they do their business. From business operation to managerial control to corporate strategy, e-business has become an integral part in organizations. As e-business evolution continues with emerging technologies and business models, a solid understanding of...

A Concurrent Pascal Compiler for Minicomputers (Lecture Notes in Computer Science) (v. 50)
A Concurrent Pascal Compiler for Minicomputers (Lecture Notes in Computer Science) (v. 50)

This paper describes a seven-pass compiler for Per Brlnch Hansen's Concurrent Pascal [1,2] programing language. Concurrent Pascal is an abstract programming language for conputer operating systems. The language extends sequential Pascal [7] with the process, nonitor, and class concepts for structured concurrent programing. A ironitor is a...

Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools
Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools

Although this book has a brand new title, it is really an updated and revised second edition to Windows XP: Under The Hood.The first edition’s automotive-themed title came about because of a certain nostalgia that I felt and I know many people share: Don’t you long for the good-old days when you could pop the hood of your car and...

Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!

Microsoft Visio 2010 is a bold new release. If you’re new to Visio, your timing is excellent! This version of Visio is easier to use than ever before and yet the diagrams you create can have more impact and style, and can present more real-world data than in any previous version.

If you’ve used prior versions...

Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go
Data-driven iOS Apps for iPad and iPhone with FileMaker Pro, Bento by FileMaker, and FileMaker Go

Use FileMaker® technologies to create powerful mobile data apps for iPhone®, iPod® touch, and iPad™

 

Apple’s FileMaker technologies make it easy to create powerful, data-driven apps for iPhone, iPod touch, iPad, and any mobile...

Writing mental ray® Shaders: A Perceptual Introduction (mental ray® Handbooks)
Writing mental ray® Shaders: A Perceptual Introduction (mental ray® Handbooks)

The word "render" isn't unique to the vocabulary of computer graphics. We can talk about a "watercolor rendering," a "musical rendering" or a "poetic rendering." In each of these, there is a transformation from one domain to another: from the landscape before the painter to color on paper, from...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Result Page: 1842 1841 1840 1839 1838 1837 1836 1835 1834 1833 1832 1831 1830 1829 1828 1827 1826 1825 1824 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy