Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Engineering Chemistry
Engineering Chemistry

Engineers and scientists are required to master chemical principles because many of the problems they encounter involve chemical processes or the composition and properties of materials. This book is designed to present the fundamental concepts of chemistry as they relate to modern engineering applications. As an up-to-date reference it can...

100 Questions  &  Answers About Multiple Sclerosis
100 Questions & Answers About Multiple Sclerosis

Approximately 350,000 people in the United States have Multiple Sclerosis. Whether you're a newly diagnosed MS patient, or a friend or relative of someone suffering from this disease, this book offers help. The only text to provide the doctor's and patient's views, 100 Questions & Answers About Multiple Sclerosis gives you...

Game Engine Gems, Volume One
Game Engine Gems, Volume One

In the fields of computer graphics and computer game development, the word gem has been established as a term for describing a short article that focuses on a particular technique, a clever trick, or practical advice that a person working in these fields would find interesting and useful....

SAP ERP Financials and FICO Handbook
SAP ERP Financials and FICO Handbook

This up-to-date quick reference guide helps the reader through the most popular SAP module. It includes material on SAP ERP Financials, SAP FICO, and SAP R/3. Unlike most books that only provide questions and answers for certification or interview preparation, this book covers fifty common business situations related to ERP Financials/FICO...

The Essentials of Computer Organization and Architecture
The Essentials of Computer Organization and Architecture

The Essentials of Computer Organization and Architecture provides a one-semester introduction to computer organization and architecture. Created in direct correlation to the ACM-IEEE Computing Curricula 2001 guidelines, this text exposes the inner working of a modern digital computer through an integrated presentation of fundamental...

C++ Plus Data Structures, Third Edition
C++ Plus Data Structures, Third Edition
C++ Plus Data Structures is designed for a course in Data Structures where C++ is the programming language. The book focuses on abstract data types as viewed from three different perspectives: their specification, their application, and their...
Introduction to 80X86 Assembly Language and Computer Architecture
Introduction to 80X86 Assembly Language and Computer Architecture
A computer can be viewed from many different levels, and used for many different functions, such as the creation of new application software. However, an actual computer works at an even lower level than this. Introduction to 80x86 Assembly Language and Computer Architecture divides its emphasis between the assembly-language/machine-language level...
Data Structures in Java: A Laboratory Course
Data Structures in Java: A Laboratory Course
Data Structures in Java: A Laboratory Course defines active learning. With sixteen labs to choose from, this laboratory manual creates a "learn by doing" experience for its students by engaging them in implementation of data structures and in application of algorithms. Students are challenged to exercise their knowledge in each of the...
User-Centered Web Development
User-Centered Web Development
When a technology such as the Web is first introduced, the primary concern is making sure that the technology works. As we become more experienced with designing web sites, the problem no longer remains the technical infrastructure but rather becomes how we can make a web site that is easy to use and meets the needs of the user. As a result, many...
Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Analysis of Algorithms : An Active Learning Approach
Analysis of Algorithms : An Active Learning Approach
The goal of Analysis of Algorithms is to raise awareness of the effect that algorithms have on the efficiency of a program and to develop the necessary skills to analyze general algorithms used in programs. The text presents the material with the expectation that it can be used with active and cooperative learning methodology, based on the premise...
Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy