A man may imagine he understands something, but still not understand anything in the way that he ought to. (Paul of Tarsus, ...
اقرأ المزيدA Programmer's Introduction to C# 2.0, Third Edition is a critical update to the highly successful second edition. It is ...
اقرأ المزيدA Software Process Model Handbook for Incorporating People's Capabilities offers the most advanced approach to date, empirically ...
اقرأ المزيدA Tester's Guide to .NET Programming focuses solely on applied programming techniques for testers. You will learn how to ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 21th Australasian Joint Conference on Artificial Intelligence, AI 2008, ...
اقرأ المزيدThe ASP.NET MVC framework is the latest evolution of Microsoft's ASP.NET web platform. It introduces a radical high–productivity ...
اقرأ المزيدThe book addresses ways and means of organizing computations, highlighting the relationship between algorithms and the basic ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First International Conference of Abstract State Machines, B and Z, ...
اقرأ المزيدProbabilistic techniques are increasingly being employed in computer programs and systems because they can increase efficiency ...
اقرأ المزيدThis volume contains the proceedings of SARA 2007, the seventh symposium, held at Whistler Village, British Columbia, Canada, ...
اقرأ المزيدAccelerated C# 2008 gives you everything you need to know about C# 2008 in a concentrated 500 pages of must-know information ...
اقرأ المزيدAjax is a web development technique that takes advantage of JavaScript to display and interact dynamically with information ...
اقرأ المزيدThe expert tuition and approach to rapid learning in Accelerated SQL Server 2008, one of the first SQL Server 2008 books ...
اقرأ المزيدAccelerated VB 2005 provides the fastest path to Visual Basic expertise for anyone already familiar with object-oriented ...
اقرأ المزيدVisual Basic 2008 offers powerful new features, and Accelerated VB 2008 is the fastest path to mastering them, and the rest ...
اقرأ المزيدThis book constitutes the refereed post-conference proceedings of the 6th International Workshop on Accelerator Programming ...
اقرأ المزيدAccess Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...
اقرأ المزيدThe sixth campaign of the Cross Language Evaluation Forum (CLEF) for European languages was held from January to September ...
اقرأ المزيد"This volume contains the papers selected for presentation at the 2nd Inter- tional Workshop on Active Mining (AM 2003) ...
اقرأ المزيدThe primary goals for this book were to enhance its capabilities particularly in those areas where its reliability and predictability ...
اقرأ المزيد