Search Results (47 titles)

Searched over 21.6 Million titles in 0.38 seconds

 
Literature (X) Most Popular Books in China (X) Technology (X)

       
1
|
2
|
3
Records: 1 - 20 of 47 - Pages: 
  • Cover Image

20 Must-have Apps für Android : Das Anwenderhandbuch

By: Holger Reibold

Ihr Android-Mobilgerät ist bereits mit einer umfangreichen App-Sammlung ausgestattet. Doch in vielen Lebenslagen genügt das nicht, und man wünscht sich zusätzliche Funktionen. In diesem FreeBook stelle ich Ihnen auf über 200 Seiten 20 spannende Apps vor, die Sie einmal gesehen haben sollten. Natürlich sind die Vorstellungen und Wünsche sehr unterschiedlich. Wenn Sie für sehr spezielle Anwendungsbereiche die passende App suchen, sollten Sie den Google Play durchsuchen. Dieses Buch soll Ihnen zum Nachschlagen und zur Anregung dienen, was Sie mit Ihrem Smartphone alles anstellen können. Das Buch darf unbegrenzt vervielfältigt und weitergegeben werden, solange es als Ganzes erhalten bleibt! Änderungen sind nicht zulässig! Autor: Holger Reibold Verlag: Brain-Media.de Umfang: 208 Seiten ISBN: 978-3-95444-036-8 Preis: kostenlos ...

Read More
  • Cover Image

Reţele de Calculatoare

By: Nicolae Sfetcu, Compiler; Nicolae Sfetcu, Translator

Nivelul Aplicaţie, Interfaţa de Programare a Aplicaţiei (IPA), Servicii de Prezentare, Nivelul Transport, Nivelul Reţea, Nivelul Legatură de Date, Nivelul Fizic, Securitatea, Managementul Reţelelor, Garanţii în Sistemul Calităţii, Perspective Mai multe formate de carte electronică: http://www.trybuyshop.com/product/retele-de-calculatoare-de-nicolae-sfetcu/...

Reţele, protocoale şi servicii asigurate prin reţelele de calculatoare.

Read More
  • Cover Image

The Treasure I : Internet and WWW or the Society of King Salome

By: Junior Parfait Ngouoto Moukolo

The Treasure: Internet or the Society of the King Salome. Don’t you know that Internet and WWW are the fruit of the Quantum Revolution? At the beginning are great inventors like Thomas Alva......

Read More
  • Cover Image

Mathematics for Computer Scientists

By: Gareth J. Janacek; Mark Lemmon Close

Aim of this book is to present basic mathematics that is needed by computer scientists The reader is not expected to be a mathematician and we hope you will find what follows to be useful....

Read More
  • Cover Image

C Programming in Linux

By: David Haskins

An introductory how to guide on C programming in linux.

Read More
  • Cover Image

An Introduction to Relational Database Theory

By: Hugh Darwen

An introduction to relational database theory.

Read More
  • Cover Image

Java : The Fundamentals of Objects and Classes; An Introduction to Java Programming

By: David Etheridge

An introduction to java programming.

Read More
  • Cover Image

X-15 Research Results

By: Wendell H. Stillwell

This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.

Read More
  • Cover Image

Microsoft Application Virtualization - An Introduction

By: Mayank Johri

An introduction to App-V Packaging

Read More
  • Cover Image

Failure to Launch : From Big Data to Big Decisions; Why velocity, variety and volume is not improving decision making and how to fix it

By: Forte Wares

The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....

Read More
  • Cover Image

The Time Rippers : Book 1

By: Pete Bertino

Two 21st century men travel through time and alternate universes recovering UFO debris from the 1947 Roswell crash.

The air pulled out of his lungs, a moment of breathlessness and it is over. The lyrics to a Pink Floyd song fill his head. “home, home again” "Home.." AM Lincoln said as he steps through the wormhole, older but not aged, his gray-green eyes betray his youth. A sense of weightlessness fills his body every time he rips. The cube glows a florescent green. The journey although less than 5 seconds is 13 years across 1 universe. He looks at the familiar beige wall that stands before him. Water dripping into one of the many drains that kept the labyrinth from flooding and the hum of traffic above ground were the last things he heard when left and were still here to welcome him back. Quake, his cousin, would be waiting in the safe-room. The entry back to his present time left him feeling airy, almost light on his feet as it always did. The sensation you might feel after a long flight on a airplane, AM didn't feel queasy, not a bit, just a little off. Although not the first rip back in time, this rip had given him the years that would never show on him. He put the Q pad back in his backpack. Quake and AM purchased a half dozen 2...

Table of Contents Chapter 1:2002 Chapter 2:2010 Chapter 3:2011 Chapter 4:1829 Chapter 5:1993 Chapter 6:1992 Chapter 7:1993 Chapter 8:1992 Chapter 9:1993-2011 ...

Read More
  • Cover Image

Data Madministration : A Paradox Style

By: Florentin Smarandache

This is a how-not-to-do book about codification, indexing, information, computer science, peripherals and terminals. The data entries are unselected and stored in a database. Afterwards, they are disorganized, unstructured and then manufactured. A data mudflow is designed later in order to misdirect all information. A nonquality control personnel filters and trashes all high valued documents and restores the chaos in the institution. The book helps with the malfunctioning of an administrative system....

The illogical mudflow of a quarterly non-production process In looking at the illogical mudflow of a quarterly non-production process, it is very imperative for us to take into account several non-practical factors that take place during such non-production process. These factors include: - Tools under maintenance - Contracts - Transportation - Supply Below is an illustration of the two major phases that are not usually encountered during the execution of a non-production process. ...

Contents Forward and Backward.........3 Chapter 1 ...................................5 Non-Basic symbols misused in Computer Science .....................5 Unintelligent terminal .........................9 The illogical mudflow of a quarterly non-production process ...............12 Chapter 2 ..................................15 The computer coding misused in Computer Science ...................15 Codification problems ..............................17 Codes misclassification .............................18 Chapter 3 ..................................21 Miscomputing the time for creating an application misusing the mudflow scrambles ........21 Misinformation deregistration and non-identification in files...............27 Chapter 4 ..................................29 Data storage and types of non-peripheral devices .....................29 Representation of Misinformation in internal memory ..............30 External non-peripherals ............................31 Printing paper ................................34 Magnetic band ...............................34 Magnetic disks ...............................35 The non-...

Read More
  • Cover Image

No Frills on Java - Introductory Level

By: sherif hassan sadek

By the end of this book, you will be familiar with the programming world, be able to write a Java class and instantiate (create) objects that represent these classes and put them into action. You will be able to write a professional code and to deal with code written by others. The topics are tied together, and built on each other, so, if this is your first time with Java, it is recommended to read the chapters in the same sequence they are presented in the book. We...

Is this book for me, do I need to read_the_book? 1. If these are your first steps to Java, then read_the_book = yes. 2. If you are not looking for a reference, but for a book that will help you understand the world of Object Oriented Programming beside Java, then read_the_book = yes. 3. If you want to focus on the 20% knowledge that will help you to do 80% of tasks required, then read_the_book = yes. If you are looking for a pile of real world scenarios and training, then read_the_book = yes....

Bird’s View • Software development life cycle (SDLC)……….…06 • Approaches to develop SDLC…………………………..08 • Object Oriented features………………………….…….14 • Java features………………………………………….……….16 • Requirements of a good program…………………...19 01 2 Class/Object 22 3 Mapping • map class to Java code…………………………………….35 • map class data members to Java code…………….36 • map class method members to Java code……….40 • Method signature……………………………………………48 • deprecated methods……………………………………...49 • passing Java arguments…………………………………..49 33 4 Java Tools 52 5 Problem solving 66 6 Simple-Level Logic • Type casting…………………………………………………...77 • Local variables………………………………………….…….78 • Simple operations…………………………………………..82 • Arithmetic operators……………………………….……..83 75 7 Moderate-Level Logic • Relation operators……………………………………..….091 • Equality operators………………………………….………091 • Conditional operators……………………………….…..091 • packaging……………………………………………………….097 • increment/decrement operators……………….….101 • Conditional statements • if………………………………….091 • switch…………………….……112 • ?:…………………………….…..115 • looping statements • for………………………………...117 • whil...

Read More
  • Cover Image

The Warp Drive : Hyper-fast Travel Within General Relativity

By: Miguel Alcubierre

It is shown how, within the framework of general relativity and without the introduction of wormholes, it is possible to modify a spacetime in a way that allows a spaceship to travel with an arbitrarily large speed. By a purely local expansion of spacetime behind the spaceship and an opposite contraction in front of it, motion faster than the speed of light as seen by observers outside the disturbed region is possible. The resulting distortion is reminiscent of the "warp drive" of science fiction. However, just as it happens with wormholes, exotic matter will be needed in order to generate a distortion of spacetime like the one discussed here....

Read More
  • Cover Image

Using Visual SourceSafe : SourceSafe / VSS Tutorial, Volume 163: SourceSafe / VSS Tutorial

By: Kevin Gao

Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....

In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....

Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...

Read More
  • Cover Image

Wright Flyer Paper : How Small Is Too Small?; Technology into 2035, Vol. 46

By: Major Paul E. Kladitis, USAF

The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....

Read More
  • Cover Image

China in Space : Civilian and Military Developments

By: Colonel David J. Thompson, USAF; Lieutenant Colonel William R. Morris, USAF

Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....

Read More
  • Cover Image

China as Peer Competitor? : Trends in Nuclear Weapons, Space, and Information Warfare

By: Lieutenant Colonel Kathryn L. Gauthier, USAF

In China as Peer Competitor? Trends in Nuclear Weapons, Space, and Information Warfare Lt Col Kathryn L. Gauthier analyzes the potential for China to emerge as a peer competitor of the United States in the coming decades. First, she examines two traditional pillars of national strength— China’s status as a nuclear weapons state and as a space power. Second, she then explores China’s growing focus on information warfare (IW) as a means to wage asymmetric warfare against a technologically advanced adversary. Third, the author carefully examines the status of the three programs, highlights areas of concern and potential conflict with the United States, and analyzes the implications of these issues for the United States....

Read More
  • Cover Image

Recapitalizing Nuclear Weapons

By: Edgar M. Vaughan

It is critical that the United States act now to put in place a program to produce a reliable replacement warhead. Colonel Vaughan addresses some critical points in the attached thesis on the Reliable Replacement Warhead and the recapitalization of the nuclear weapons complex....

1 Introduction . . . . . . . . . . . . . . . . . . . . . 1 An Aging Stockpile . . . . . . . . . . . . . . . . . . 1 Points of View . . . . . . . . . . . . . . . . . . . . . . 3 Alternatives . . . . . . . . . . . . . . . . . . . . . . . .5 Preview of Remaining Chapters . . . . . . . . . . 8 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 2 THE CASE FOR MAINTAINING THE STATUS QUO . . . . . . . . . . . . . . . . . . . . . . . . . . 11 The Stockpile is Safe and Reliable . . . . . . . 12 A Limited Role for Nuclear Weapons . . . . . .13 Nuclear Posture Review . . . . . . . . . . . . . . .17 Responsive Infrastructure and Replacement Warheads . . . . . . . . . . . . . . . . . . . . . . . 19 Summary . . . . . . . . . . . . . . . . . . . . . . . . 23 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .23 3 THE CASE FOR BEGINNING RECAPITALIZATION NOW . . . . . . . . . . . . . .25 Future Role for Nuclear Weapons . . . . . . . . 26 Nuclear Weapons Needed for the Foreseeable Future . . . . . . . . . . . . . . . . . . . 28 Stockpile Stewardship Program Concerns . . . . . . . . . . . . . . . . . . . . . . . . ...

Read More
  • Cover Image

Introdução ao Uso do LaTeX: Versão 1.2a

By: Ivo Fernandez Lopez e Maria Darci Godinho da Silva

Apesar de haver uma literatura grande sobre o LaTeX, uma boa parte dos trabalhos disponíveis é relativamente antiga e não contém os avanços dos últimos anos. Em virtude disto, resolvemos escrever um texto sobre o LaTeX que, de uma forma simples e auto contida, apresente as opções mais recentes que estenderam e facilitaram o aprendizado e aplicação. No livro, além do básico sobre o LaTeX, acrescentaram-se tópicos sobre como elaborar apresentações, elaborar monografias, dissertações e teses, elaborar uma prova com gabarito, incluir arquivos multimídia, elaborar pôsteres para apresentação em congresso, usar recursos mais modernos para digitação de equações longas e sistemas de equações, elaborar bibliografias, incluir um índice remissivo, incluir sumário etc. A bibliografia do livro é constituída quase que exclusivamente de arquivos disponíveis na Internet e é feito um comentário sobre cada citação, além de permitir o acesso através de hiperligação ("hyperlink"). Ao longo do texto são citadas as referências que podem aprofundar os tópicos, caso o leitor sinta necessidade. No segundo semestre de 2013 foram feitos diversos ac...

1 Introdução -- Noções Básicas de LATEX 1.1 Origem: TeX (TEX) 1.2 Avanço: LaTeX (LATEX) 1.3 Exemplo mínimo de arquivo em LATEX 1.4 Resultado da compilação 1.5 Programas indicados 1.6 Gerando arquivo .pdf ou .dvi (compilação) 1.7 Distribuições de LATEX 1.8 Distribuição MiKTeX 1.9 Distribuição TeXLive 1.10 Editor para os arquivos .tex 1.11 Editor TeXworks 1.11.1 Configurações básicas 1.11.2 Algumas sugestões para o seu uso 1.12 Exemplo da interface do TeXworks 1.13 Editor Texmaker 1.14 Exemplo da interface do Texmaker 1.15 Arquivos auxiliares 2 LATEX Básico 2.1 Caracteres especiais 2.2 Estrutura dos arquivos em LATEX 2.3 Comandos básicos, ambientes, matemática 2.4 Classes de documentos 2.5 Parágrafos, espaços, separação de sílabas 2.6 Fontes e LuaTeX 2.7 Capítulos, seções, apêndice etc 2.8 Título, sumário, listas de tabelas e de figuras 2.9 Geometria da página, espaçamento entre linhas 2.10 Numeração e formatação das páginas, notas de rodapé 2.11 Principais pacotes 2.12 Símbolos matemáticos 2.13 Subscritos, sobrescritos, funções pré-de...

Read More
       
1
|
2
|
3
Records: 1 - 20 of 47 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.