Home | Amazing | Today | Tags | Publishers | Years | Search 
Ruby Pocket Reference
Ruby Pocket Reference
Although Ruby is an easy language to learn, in the heat of action you may find that you can't remember the correct syntax for a conditional or the name of a method. This handy pocket reference offers brief yet clear explanations of Ruby's core components, from operators to reserved words to data structures to method syntax, highlighting those key...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Evolving Connectionist Systems: The Knowledge Engineering Approach (Evolving Connectionist Systems)
Evolving Connectionist Systems: The Knowledge Engineering Approach (Evolving Connectionist Systems)
This second edition of Evolving Connectionist Systems presents generic computational models and techniques that can be used for the development of evolving, adaptive modelling systems, as well as new trends including computational neuro-genetic modelling and quantum information processing related to evolving systems. New applications, such as...
Data Mining With Ontologies: Implementations, Findings and Frameworks (Premier Reference)
Data Mining With Ontologies: Implementations, Findings and Frameworks (Premier Reference)
Data mining, also referred to as knowledge discovery in databases (KDD), is a process of finding new, interesting, previously unknown, potentially useful, and ultimately understandable patterns from very large volumes of data. Data mining is a discipline which brings together database systems, statistics, artificial intelligence, machine learning,...
Agent and Web Service Technologies in Virtual Enterprises (Premier Reference Source)
Agent and Web Service Technologies in Virtual Enterprises (Premier Reference Source)
Use of Internet technologies for the interest of individuals and organizations is becoming more contextrelated and the center of gravity is correctly placed to the utility and the value that all involved parties are getting from a business transaction, a business venture or a collaborative service.

Therefore, both aspects that are
...
Beginning Joomla!: From Novice to Professional
Beginning Joomla!: From Novice to Professional
Do you want the ability to manage documents, photos, and other content over the Web but don't want to shell out thousands of dollars in proprietary solutions? Want to create an online community for your hobby or user group? You're not alone. For thousands of like-minded around the globe, the answer is Joomla!, an open source content management...
The Book of Qt 4: The Art of Building Qt Applications
The Book of Qt 4: The Art of Building Qt Applications
Cross-platform development is a kind of holy grail, and Trolltech's Qt toolkit may well be the most promising solution yet to this development challenge. Qt is widely used for the development of GUI applications as well as console tools and servers, and it's especially appealing to programmers who need to write cross-platform applications to run on...
Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

Data Modeling Fundamentals: A Practical Guide for IT Professionals
Data Modeling Fundamentals: A Practical Guide for IT Professionals
The purpose of this book is to provide a practical approach for IT professionals to acquire the necessary knowledge and expertise in data modeling to function effectively. It begins with an overview of basic data modeling concepts, introduces the methods and techniques, provides a comprehensive case study to present the details of the data model...
Agile Processes in Software Engineering and Extreme Programming: 8th International Conference, XP 2007, Como, Italy
Agile Processes in Software Engineering and Extreme Programming: 8th International Conference, XP 2007, Como, Italy
This book constitutes the refereed proceedings of the 8th International Conference on Agile Processes in Software Engineering and eXtreme Programming, XP 2007, held in Como, Italy in June 2007.

The 10 revised full papers and 16 revised short papers presented together with 4 poster papers, 18 experience papers, 2 research ideas and 3 panel...

Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
Practical JBossВ® Seam Projects
Practical JBossВ® Seam Projects

Practical JBoss® Seam Projects, written by renowned author and enterprise Java practitioner Jim Farley, is expected to be the first practical projects book of its kind on this groundbreaking open source lightweight JSF-EJB3 framework.

  • Practical application scenarios are used to demonstrate the nature of the...
Result Page: Previous 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy