Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
Fodor's Walt Disney World with Kids 2012: with Universal Orlando, SeaWorld & Aquatica (Travel Guide)
Fodor's Walt Disney World with Kids 2012: with Universal Orlando, SeaWorld & Aquatica (Travel Guide)

Your Ticket to a Magical Family Vacation!Inside this new edition is all the information you need to have the family vacation of a lifetime at the Orlando theme parks. Up-to-date and written with the help of more than 500 families, this guide is packed with details on all the attractions at Walt Disney World, Universal Orlando, and...

The Politics of National Celebrations in the Arab Middle East (English and English Edition)
The Politics of National Celebrations in the Arab Middle East (English and English Edition)

Why do countries celebrate defining religious moments or significant events in their history, and how and why do their leaders select certain events for commemoration and not others? This book is the first systematic study of the role of celebrations and public holidays in the Arab Middle East from the fall of the Ottoman Empire to the...

Multistate Systems Reliability Theory with Applications
Multistate Systems Reliability Theory with Applications

Most books in reliability theory are dealing with a description of component and system states as binary: functioning or failed. However, many systems are composed of multi-state components with different performance levels and several failure modes. There is a great need in a series of applications to have a more refined description of these...

VLSI for Wireless Communication
VLSI for Wireless Communication

VLSI for Wireless Communication, Second Edition, an advanced level text book, takes a system approach starting with an overview of the most up to date wireless systems and the transceiver architecture available today. Wireless standards are first introduced (updated to include the most recent 3G/4G standards in the second edition), and...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

The Motorola Xoom: Visual QuickStart Guide
The Motorola Xoom: Visual QuickStart Guide

Back in the early 1990s—1993, to be exact—Apple Computer launched a handheld computer product known as the Newton. Interestingly, the Newton was the first device to be called a personal digital assistant (PDA), a term that lives on today. Essentially, it was the first tablet computer. The one thing that most folks...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Microsoft SharePoint Foundation 2010: Basic
Microsoft SharePoint Foundation 2010: Basic
Our manuals facilitate your learning by providing structured interaction with the software itself. While we provide text to explain difficult concepts, the hands-on activities are the focus of our courses. By paying close attention as your instructor leads you through these activities, you will learn the skills and concepts...
Zend Framework 2.0 Cookbook
Zend Framework 2.0 Cookbook
Welcome to Zend Framework 2.0 Cookbook, the RAW edition. A RAW (Read As we Write) book contains all the material written for the book so far, but available for you right now, before it's finished. As the author writes more, you will be invited to download the new material and continue reading, and learning. Chapters in a RAW...
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
unlimited object storage image
Result Page: Previous 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy