|
|
|
|
Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... | | C++ 2013 for C# Developers
C++/CLI was originally envisioned as a high-level assembler for the .NET runtime, much like C is often considered a high-level assembler for native code generation. That original vision even included the ability to directly mix IL with C++ code, mostly eliminating the need for the IL assembler ilasm.
As the design of C++/CLI... | | Beginning Game Development with Python and Pygame: From Novice to ProfessionalLike music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you've yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you've been spending a lot of time thinking about a game idea of your own, or... |
|
Fundamental Nursing Skills
Providing forward-thinking approaches and ideas for nurses of all categories, this reference has been written primarily in response to increasing concerns regarding the perceived lack of ability in both students and newly qualified nurses to perform clinical skills.
By outlining the elements of essential nursing procedure in a... | | Sams Teach Yourself Microsoft Office Access 2003 in 24 HoursIn just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.
Welcome to Sams Teach Yourself Microsoft Office... | | Nuendo Power!Whether you are a musician, recording engineer, sound designer, video editor, or other type of media author, certainly you have noticed that the demands of audio production in today’s multimedia environment have increased dramatically. With the proliferation of surround sound systems in theaters, homes, and specialized... |
|
Drawing the Line: Art Therapy with the Difficult ClientThis resourceful guide presents art therapy techniques for difficult clients where the typical therapist-client interaction can often be distant, demanding, and frustrating. Offering practical and theoretical information from a wide variety of treatment populations and diagnostic categories; and incorporating individual, group, and family therapy... | | | | The Fractal Structure of Data Reference: Applications to the Memory HierarchyFor purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to... |
|
The People CMM: A Framework for Human Capital Management (2nd Edition)
Organizations are now competing in two markets, one for their products and services and one for the talent required to produce or perform them. Success in the former is determined by success in the latter. The ability to compete is directly related to the ability to attract, develop, motivate, organize, and retain the... | | Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... | | Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to... |
|
|
Result Page: 126 125 124 123 122 121 120 119 118 117 116 |