|
|
Game Programming for Teens
Hey, reader. Thanks for reading and/or buying my book. I am really thankful for it.
What is programming? Programming, according to Dictionary.com, is ‘‘a set of coded instructions that enables a machine, especially a computer, to perform a desired sequence of operations.’’ In other words, programming allows... | | IPv6 for Enterprise Networks (Networking Technology)
Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world... | | Ranking Queries on Uncertain Data (Advances in Database Systems)
Uncertain data is inherent in many important applications, such as environmental surveillance, market analysis, and quantitative economics research. Due to the importance of those applications and rapidly increasing amounts of uncertain data collected and accumulated, analyzing large collections of uncertain data has become an important task.... |
|
|
The Top Ten Algorithms in Data Mining
Identifying some of the most influential algorithms that are widely used in the data mining community, The Top Ten Algorithms in Data Mining provides a description of each algorithm, discusses its impact, and reviews current and future research. Thoroughly evaluated by independent reviewers, each chapter focuses on a... | | Facebook: The Missing Manual (Missing Manuals)
Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum.... | | Introduction to Search with Sphinx: From installation to relevance tuning
I can’t quite believe it, but just 10 years ago there was no Google.
Other web search engines were around back then, such as AltaVista, HotBot, Inktomi, and AllTheWeb, among others. So the stunningly swift ascendance of Google can settle in my mind, given some effort. But what’s even more unbelievable is that... |
|
Microsoft Lync Server 2010 Unleashed
This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified... | | Microsoft SharePoint Foundation 2010 Step by Step
Experience learning made easy-and quickly teach yourself how to use Microsoft SharePoint Foundation to enable effective team collaboration. With Step By Step, you set the pace-building and practicing the skills you need, just when you need them!
-
Build your own SharePoint site with easy-to-use templates
... | | Cryptanalysis of RSA and Its Variants
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its... |
|
Result Page: 1844 1843 1842 1841 1840 1839 1838 1837 1836 1835 1834 1833 1832 1831 1830 1829 1828 1827 1826 |