Get your first look at Windows 7 and see how much more productive and efficient the development life cycle can be. Guided by three Windows programming experts, you'll examine new Windows 7 capabilities and get a head start exploiting them to build better user experiences and applications. Topics include multi-touch gesture support, graphics and video enhancements, the Ribbon user interface (including the difference between Windows 7 Ribbon and Windows Presentation Foundation (WPF) Ribbon), federated search, the Libraries feature, Taskbar functionality, the new Windows Sensor and Location platform, and more.
Introduction to Microsystem Design (RWTHedition)
This book was developed from lectures held at RWTH Aachen University, Germany
and Tsinghua University at Beijing, P.R. China. It may be used as a basis for similar
lectures on designing of microsystems. For this purpose, it is recommended to
follow the sequence of this book, because it is arranged such that following chapters
are... Professional iPhone and iPad Application Development
Everything you need to create top-notch applications for the iPhone and iPad
Developers have demanded an advanced guide to using the very latest version of the iPhone and iPad SDK to develop applications-and this book answers that call! Packed with over twenty complete standalone applications that are designed to be...
Creative Composition: Digital Photography Tips & Techniques
Sometimes you get the best results by breaking the rules, but first you have to know what the rules are! In this indispensable photography guide, renowned photographer Harold Davis first walks you through the recommended guidelines for composing great shots with your DSLR camera-and then shows you how to break free, build your own unique style,...
Network Security Assessment Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by... Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,...