Computer Structures Readings amp; Examples
This book is a better way to know about computer architecture.
An introduction to information theory and entropy
its nice book on information theory and entropy. u can get more information if u go through this link
Introduction to Text Editing
Text Editing describes ways in which you can control the behavior of the Cocoa text system as it performs text editing. Text editing is the modification of text characters or attributes by interacting with a text view object, either programmatically or by direct user action.
Introduction to Text System User Interface Layer
Text System User Interface Layer describes the high-level user interface to the Cocoa text system through the NSTextView class.
Introduction to Text System Overview
Text System Overview provides a survey of the Cocoa text system. The articles introduce important features and describe aspects of the text system as a whole.
Art of Electronic Publishing: The Internet and Beyond
The WWW world consists of documents, and links. Indexes are special documents which, rather than being read, may be searched. The result of such a search is another ('virtual') document containing links to the documents found. A simple protocol ('HTTP') is used to allow a browser program to request a keyword search by a remote information server.
Dictionary of Programming Languages
Welcome to the Dictionary of Programming Languages, a compendium of computer coding methods assembled to provide information and aid your appreciation for computer science history. The dictionary currently has over 120 entries.
Hacking Mozilla Table of Contents
To get your code checked into mozilla.org's CVS repository you'll need to understand our code development cycle, coding practices, and checkin requirements. You probably also want to have a reasonable understanding about the project's organization.
Concurrent Versions System (CVS) Best Practices
This article outlines some of the best practices that can be adopted when Concurrent Versions System is used as the configuration management tool in your software project.
Privacy Protection Software
Basic Internet security measures including ISP online filters, firewall, and virus, Trojan, worm, spyware and spam protection are only the beginning. For families, software to protect kids is needed. If you keep sensitive personal information and/or documents on your computer, they should be password protected or encrypted.
Introduction to Text Input Management - Free eBook Introduction to Text Input Management - Download ebook Introduction to Text Input Management free
|