Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Precalculus: Graphs & Models
Precalculus: Graphs & Models
Enhancing a Tradition of Success

We take great satisfaction from the fact that more than 100,000 students have learned college algebra or precalculus from a Barnett Series textbook. Ray Barnett is one of the masters of college textbook writing. His central approach is proven and remains effective for today’s
...
Microsoft® Windows® Registry Guide, Second Edition
Microsoft® Windows® Registry Guide, Second Edition

Understand how the registry works—and customize Windows to run the way you want.

Get the in-depth information you need to modify—and seamlessly manage—the Windows registry. Written for IT professionals and power users, this vital resource reveals little-known registry techniques, tricks, tips, and...

Software Product Line Engineering: Foundations, Principles and Techniques
Software Product Line Engineering: Foundations, Principles and Techniques
This textbook addresses students, professionals, lecturers and researchers interested in software product line engineering. With more than 100 examples and about 150 illustrations, the authors describe in detail the essential foundations, principles and techniques of software product line engineering. The authors are professionals and researchers...
Data Integration in the Life Sciences: Third International Workshop, DILS 2006, Hinxton, UK, July 20-22, 2006, Proceedings
Data Integration in the Life Sciences: Third International Workshop, DILS 2006, Hinxton, UK, July 20-22, 2006, Proceedings
Data management and data integration are fundamental problems in the life sciences. Advances in molecular biology and molecular medicine are almost universally underpinned by enormous efforts in data management, data integration, automatic data quality assurance, and computational data analysis. Many hot topics in the life sciences, such as systems...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Commercial systems built today are increasingly using XML technologies for storing any amount of text or data.

Services and Business Computing Solutions with XML: Applications for Quality Management and Best Processes collects the latest research for academicians and practitioners that describes the use and synergy between...

Citrix Access Suite 4 Advanced Concepts: The Official Guide, Second Edition
Citrix Access Suite 4 Advanced Concepts: The Official Guide, Second Edition
What is access? Access is a means to an end—the means of closing the gap that separates ideas, understanding, knowledge, insight, and action. Access facilitates, access informs, access empowers, and access has the ability to transform the way we work, live, play and learn. From the telegraph to radio to television and the Internet,...
A Guide to Dissection of the Human Body
A Guide to Dissection of the Human Body

In this second edition of A Guide to Dissection of the Human Body, certain dissecting instructions have been revised to increase clarity. Methodical and comprehensive, the guide complements various anatomy courses. The terminology has been checked and brought up to date, in accordance with the latest version of Terminologia Anatomica...

SAP BusinessObjects Dashboards 4.1 Cookbook
SAP BusinessObjects Dashboards 4.1 Cookbook

Over 100 simple and incredibly effective recipes to help transform your static business data into exciting dashboards filled with dynamic charts and graphics

About This Book

  • Create impressive dashboards with SAP BusinessObjects Dashboards 4.1 (formerly known as Xcelsius)
  • Find solutions...
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

The CISSP Prep Guide: Gold Edition
The CISSP Prep Guide: Gold Edition
An arsenal of inside information on CISSP and how to master the certification test!

More and more frequently, corporations are requiring that their employees provide professional certifications to prove that they possess the core competencies to do their technical jobs. The Certified Information Systems Security Professional examination (CISSP)...

Asterisk: The Definitive Guide (Definitive Guides)
Asterisk: The Definitive Guide (Definitive Guides)

This is a book for anyone who uses Asterisk.

Asterisk is an open source, converged telephony platform, which is designed primarily to run on Linux. Asterisk combines more than 100 years of telephony knowledge into a robust suite of tightly integrated telecommunications applications. The power of Asterisk lies in its...

unlimited object storage image
Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy