Télécharger le livre :  Mastering System Center 2012 R2 Configuration Manager
Ajouter à ma liste d'envies
Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning...

Editeur : Sybex
Parution : 2014-02-19

PDF, ePub

40,99
Télécharger le livre :  Cybercrime and Cyber Warfare
Ajouter à ma liste d'envies
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...

Editeur : Wiley-ISTE
Parution : 2014-02-19

PDF, ePub

139,99
Télécharger le livre :  Professional C# 5.0 and .NET 4.5.1
Ajouter à ma liste d'envies
Comprehensive, advanced coverage of C# 5.0 and .NET 4.5.1 Whether you're a C# guru or transitioning from C/C++, staying up to date is critical to your success. Professional C# 5.0 and .NET 4.5.1 is your go-to guide for navigating the programming environment for the...

Editeur : Wrox
Parution : 2014-02-19

PDF, ePub

38,99
Télécharger le livre :  Bas van Fraassen's Approach to Representation and Models in Science
Ajouter à ma liste d'envies
This book analyzes Bas van Fraassen’s characterization of representation and models in science. In this regard, it presents the philosophical coordinates of his approach and pays attention to his structural empiricism as a framework for his views on scientific...

Editeur : Springer
Parution : 2014-02-19

PDF, ePub

116,04
Télécharger le livre :  Microsoft Big Data Solutions
Ajouter à ma liste d'envies
Tap the power of Big Data with Microsoft technologies Big Data is here, and Microsoft's new Big Data platform is a valuable tool to help your company get the very most out of it. This timely book shows you how to use HDInsight along with HortonWorks Data Platform for...

Editeur : Wiley
Parution : 2014-02-19

PDF, ePub

32,99
Télécharger le livre :  Software Engineering Education for a Global E-Service Economy
Ajouter à ma liste d'envies
This book presents and discusses the state of the art and future trends in software engineering education. It introduces new and innovative methods, models and frameworks to focus the training towards the needs and requirements of the industry. Topics included in this...

Editeur : Springer
Parution : 2014-02-18

ePub

52,74
Télécharger le livre :  Playful User Interfaces
Ajouter à ma liste d'envies
The book is about user interfaces to applications that have been designed for social and physical interaction.The interfaces are ‘playful’, that is, users feel challenged to engage in social and physical interaction because that will be fun.The topics that will be...

Editeur : Springer
Parution : 2014-02-17

PDF, ePub

94,94
Télécharger le livre :  A Defeasible Logic Programming-Based Framework to Support Argumentation in Semantic Web Applications
Ajouter à ma liste d'envies
This book reports on the development and validation of a generic defeasible logic programming framework for carrying out argumentative reasoning in Semantic Web applications (GF@SWA). The proposed methodology is unique in providing a solution for representing incomplete...

Editeur : Springer
Parution : 2014-02-15
Collection : Springer Theses
ePub

147,69
Télécharger le livre :  Proactive Data Mining with Decision Trees
Ajouter à ma liste d'envies
This book explores a proactive and domain-driven method to classification tasks.This novel proactive approach to data mining not only induces a model for predicting or explaining a phenomenon, but also utilizes specific problem/domain knowledge to suggest specific...

Editeur : Springer
Parution : 2014-02-14

ePub

52,74
Télécharger le livre :  Support Vector Machines Applications
Ajouter à ma liste d'envies
Support vector machines (SVM) have both a solid mathematical background and practical applications. This book focuses on the recent advances and applications of the SVM, such as image processing, medical practice, computer vision, and pattern recognition, machine...

Editeur : Springer
Parution : 2014-02-12

ePub

168,79
Télécharger le livre :  Threat Modeling
Ajouter à ma liste d'envies
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...

Editeur : Wiley
Parution : 2014-02-12

PDF, ePub

50,99
Télécharger le livre :  Constraints Meet Concurrency
Ajouter à ma liste d'envies
This book describes the benefits that emerge when the fields of constraint programming and concurrency meet. On the one hand, constraints can be used in concurrency theory to increase the conciseness and the expressive power of concurrent languages from a pragmatic...

Editeur : Atlantis Press
Parution : 2014-02-11

ePub

52,74
Télécharger le livre :  Learning Python with Raspberry Pi
Ajouter à ma liste d'envies
The must-have companion guide to the Raspberry Pi User Guide! Raspberry Pi chose Python as its teaching language of choice to encourage a new generation of programmers to learn how to program. This approachable book serves as an ideal resource for anyone wanting to use...

Editeur : Wiley
Parution : 2014-02-11

PDF, ePub

18,99
Télécharger le livre :  HTML5 Games
Ajouter à ma liste d'envies
HTML5 Gamesshows you how to combine HTML5, CSS3 and JavaScript to make games for the web and mobiles - games that were previously only possible with plugin technologies like Flash. Using the latest open web technologies, you are guided through the process of creating a...

Editeur : Wiley
Parution : 2014-02-10

PDF, ePub

25,99
Télécharger le livre :  Recommender Systems for Location-based Social Networks
Ajouter à ma liste d'envies
Online social networks collect information from users' social contacts and their daily interactions (co-tagging of photos, co-rating of products etc.) to provide them with recommendations of new products or friends. Lately, technological progressions in mobile devices...

Editeur : Springer
Parution : 2014-02-08

ePub

52,74
Télécharger le livre :  Multi-Touch
Ajouter à ma liste d'envies
Smartphones, Tablets, Multimedia-Konsolen im Fahrzeug, Microsoft Windows 8, PixelSense, Surface – diese modernen Systeme haben alle eines gemeinsam: bedient werden sie mit Berührungen. Die aktuelle Generation bietet dabei durch gleichzeitige Interaktion mit mehreren...

Editeur : Springer Vieweg
Parution : 2014-02-07

ePub

26,59
Télécharger le livre :  Trends and Challenges in Digital Business Innovation
Ajouter à ma liste d'envies
This book describes the trends in digital innovation that are of most importance for businesses and explores the key challenges. The book is in three parts, the first of which focuses on developments in digital systems. Here, the ever-growing relevance of big data,...

Editeur : Springer
Parution : 2014-02-04

ePub

49,57
Télécharger le livre :  Computer Engineering and Networking
Ajouter à ma liste d'envies
This book aims to examine innovation in the fields of computer engineering and networking. The book covers important emerging topics in computer engineering and networking, and it will help researchers and engineers improve their knowledge of state-of-art in related...

Editeur : Springer
Parution : 2014-02-03

ePub

304,89
Télécharger le livre :  Hacking Point of Sale
Ajouter à ma liste d'envies
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...

Editeur : Wiley
Parution : 2014-02-03

PDF, ePub

48,99
Télécharger le livre :  Practical Reverse Engineering
Ajouter à ma liste d'envies
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and...

Editeur : Wiley
Parution : 2014-02-03

PDF, ePub

42,99
<< < 716717718719720 >