 |
|
 Show Me Microsoft Office PowerPoint 2003For those who would rather be shown how than told how.
-
Create powerful presentations faster using ready-made design templates and Smart Tags
-
Organize information and add impact with clip art, tables, charts, and diagrams
... |  |  Protected Mode Software Architecture (PC System Architecture Series)Protected Mode Software Architecture helps readers understandthe problems that single-task and multitasking operating systems must dealwith, and then examines each component of both the real and protected modesoftware architectures. This book is organized into three parts. Part One:Background introduces the reader to the problems faced... |  |  Programming ChallengesThere are many distinct pleasures associated with computer programming. Craftsmanship has its quiet rewards, the satisfaction that comes from building a useful object and making it work. Excitement arrives with the flash of insight that cracks a previously intractable problem. The spiritual quest for elegance can turn the hacker into... |
|
 Solaris Internals: Core Kernel Architecture The definitive Sun Microsystems guide to the internals of the Solaris kernel.
This book focuses on the core kernel functions, major data structures and algorithms. Its practical approach makes it an essential resource for anyone responsible for kernel, driver or application software. Anyone doing development, debugging, maintenance,... |  |  Extreme Programming Applied: Playing to Win Extreme Programming (XP) is a significant departure from traditional software development methods, one that is ushering in a change for both developers and business people. It is an agile methodology, which enables highly productive teams to produce quality software from rapidly changing or unclear requirements. XP is disciplined software... |  |  A History of Modern Computing, 2nd EditionComputers were invented to ‘‘compute’’: to solve ‘‘complex mathematical problems,’’ as the dictionary still defines that word. They still do that, but that is not why we are living in an ‘‘Information Age.’’ That reflects other things that computers do: store and retrieve data,... |
|
 Honeypots: Tracking Hackers"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture... |  |  Artificial Intelligence: Modern ApproachIntegrates state-of-the-art AI techniques into intelligent agent designs, using examples and exercises to lead the reader from simple reactive agents to full knowledge-based agents with natural language capabilities. Covers areas that are sometimes under-emphasized--reasoning under uncertainty, learning, natural language, vision and robotics--and... |  |  Object-Oriented Software Construction (2nd Edition)The definitive reference on the most important new technology in software!
“While the original version of OOSC is a classic, OOSC 2/E is destined to overshadow it and all other general introductions . . . literally an epic work.” —James C. McKim, Jr., Hartford Graduate Center
“Compelling. Extremely... |
|
|
Result Page: 498 497 496 495 494 493 492 491 490 489 488 487 486 485 484 483 482 481 480 |