Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Packet Guide to Routing and Switching
Packet Guide to Routing and Switching

For a long time, I was very happy building Ethernet networks, working with switches and then moving to 802.11. It took awhile, but eventually I realized that the world of interconnected networks cannot be reached with Layer 2 alone. In addition, as you spread your wings from the Layer 2 broadcast domains, you encounter the wonders of...

3000 Jahre Analysis: Geschichte, Kulturen, Menschen (Vom Zählstein zum Computer) (German Edition)
3000 Jahre Analysis: Geschichte, Kulturen, Menschen (Vom Zählstein zum Computer) (German Edition)

In dem Band werden Entstehung und Entwicklung der grundlegenden Begriffe der Analysis von der Antike bis heute ausführlich behandelt. Eingebettet sind diese Informationen in die Beschreibung historischer und kultureller Ereignisse, die Lebensläufe bedeutender Mathematiker und der von ihnen entwickelten Teilgebiete der Analysis....

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Beginning OpenOffice Calc: From Setting Up Simple Spreadsheets to Business Forecasting
Beginning OpenOffice Calc: From Setting Up Simple Spreadsheets to Business Forecasting

OpenOffice Calc is the most powerful and widespread open source spreadsheet application in existence. It is the only real alternative to Excel. Jacek Artymiak is widely regarded as the authority on OpenOffice Calc. He takes you, step by step, from the interface and handling Calc files to working with data sources...

Apache Tomcat 7
Apache Tomcat 7
The first edition of this book covered the then-new Jakarta Tomcat 4. Tomcat has come a long way from there, becoming Apache Tomcat in the process, with version 7 released in January 2011. During this time, Tomcat has become the most popular and used Java servlet container on the market. Other open source application servers also...
Switching to a Mac Portable Genius
Switching to a Mac Portable Genius

The stats tell us that people are switching from Windows to the Mac in record numbers, but those stats don’t tell us why. Perhaps it’s because Windows users would like to actually enjoy using a computer for a change. Perhaps it’s because Macs just work: you take them out of the box, plug them in, and within minutes...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices
Connections for the Digital Age: Multimedia Communications for Mobile, Nomadic and Fixed Devices

Explores and analyzes past and current technologies and trends in multimedia communication

Digital natives—those persons born in the digital age—have an ever-widening range of wireless-enabled devices at their disposal. They are the drivers of multimedia communications, continually seeking out the technologies...

Project Manager Street Smarts: A Real World Guide to PMP Skills
Project Manager Street Smarts: A Real World Guide to PMP Skills

The project management discipline is swiftly becoming the catalyst of choice for change in modern business models. The added value project management provides to the bottom line is now considered a corporate lifesaver, not a corporate cost center. Even though the discipline does not usually generate revenue (except in projectized...

IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
IMS Application Developer's Handbook: Creating and Deploying Innovative IMS Applications
Many books have been written about IMS, so why do we think another is needed? Most of the existing books are written from the perspective of those who implement the technology, either network vendors or operators. There is no such focus for developers. The standards that form the basis of IMS are complex – as they are...
Design for Hackers: Reverse Engineering Beauty
Design for Hackers: Reverse Engineering Beauty

The smash hit introductory design book that debuted at #18 on Amazon
Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google
...

Result Page: Previous 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy