Home | Amazing | Today | Tags | Publishers | Years | Search 
Iwork '05: The Missing Manual
Iwork '05: The Missing Manual

Introduced by Apple in January 2005, iWork '05 is an innovative new suite of document and presentation software that's the same caliber as Apple's groundbreaking digital media applications and that's wholly dedicated to what Mac users like you care about most: artistry and creativity. iWork '05 isn't about "office...

The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
For many organizations their dependence on information systems, both within the company
and networked up and down their supply chain, is now business critical. Any sustained loss
of availability of these systems would threaten the very existence of the business.

Security is a holistic issue. Vulnerabilities in physical,
...
Film Production Management
Film Production Management
Five years have passed since the second edition of this book was published.
Technological changes have been dramatic since then, most notably the arrival
of digital filmmaking. There is hardly a motion picture nowadays that does
not use computer generated or altered images. Whole features have been shot
not on film but on High
...
Webwork in Action
Webwork in Action
This book is very much what the title says: a book about working on web-based applications, using real-world examples along the way. That’s what WebWork emphasizes: working on your project, not wrestling with your framework. Although it isn’t the most-used web framework in the Java world, WebWork is widely known as the most refined, and...
Software Project Secrets: Why Software Projects Fail
Software Project Secrets: Why Software Projects Fail
Previously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the...
Skype Me!: From Single User to Small Enterprise and Beyond
Skype Me!: From Single User to Small Enterprise and Beyond
You are going to love Skype Me! From Single User to Small Enterprise and Beyond. Here’s why: Michael Gough knows his stuff. Michael has also completed a remarkably difficult project around a remarkably cool product, Skype.

Michael is a busy guy. I have no idea where he found time to write a
...
ASP.NET 2.0 Demystified
ASP.NET 2.0 Demystified

The fast and easy way to learn ASP.NET 2.0

Get up to speed on ASP.NET 2.0 in no time using this easy-to-follow guide. ASP.NET 2.0 Demystified shows you how to write server-side components for dynamic, interactive web pages and powerful web-based applications. Step-by-step instructions with lots of examples help you learn...

Behind Closed Doors: Secrets of Great Management (Pragmatic Programmers)
Behind Closed Doors: Secrets of Great Management (Pragmatic Programmers)
Great management is difficult to see as it occurs. It's possible to see the results of great management, but it's not easy to see how managers achieve those results. Great management happens in one-on-one meetings and with other managers---all in private. It's hard to learn management by example when you can't see it.

You can learn to be a...

Machine Learning and Data Mining for Computer Security: Methods and Applications
Machine Learning and Data Mining for Computer Security: Methods and Applications

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the...

Complexity Theory and Cryptology
Complexity Theory and Cryptology

Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a...

Foundations of Learning Classifier Systems (Studies in Fuzziness and Soft Computing)
Foundations of Learning Classifier Systems (Studies in Fuzziness and Soft Computing)
Learning Classifier Systems (LCS) [Holland, 1976] are a machine learning technique which combines evolutionary computing, reinforcement learning, supervised learning or unsupervised learning, and heuristics to produce adaptive systems. They are rulebased systems, where the rules are usually in the traditional production system form of “IF...
Collaborative Networks and Their Breeding Environments: IFIP TC 5 WG 5. 5 Sixth IFIP Working Conference
Collaborative Networks and Their Breeding Environments: IFIP TC 5 WG 5. 5 Sixth IFIP Working Conference
Progress in collaborative networks continues showing a growing number of manifestations and has led to the acceptance of Collaborative Networks (CN) as a new scientific discipline.  Contributions to CN coming from multiple reference disciplines has been extensively investigated.  In fact developments in CN have benefited from...
Result Page: Previous 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy