Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Everyday Language of White Racism (Blackwell Studies in Discourse and Culture)
The Everyday Language of White Racism (Blackwell Studies in Discourse and Culture)
In The Everyday Language of White Racism, Jane H. Hill explores the myth that White racism is fading in the western world. Instead she reveals it to be a pervasive and highly adaptive cultural system, one that has endured in various forms for hundreds of years. Hill’s incisive analysis of everyday talk and text shows how language...
Touch of Class: Learning to Program Well with Objects and Contracts
Touch of Class: Learning to Program Well with Objects and Contracts
From object technology pioneer and ETH Zurich professor Bertrand Meyer, winner of the Jolt award and the ACM Software System Award, a revolutionary textbook that makes learning programming fun and rewarding. Meyer builds his presentation on a rich object-oriented software system supporting graphics and multimedia, which students can use to produce...
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
The Accredited Symbian Developer Primer: Fundamentals of Symbian OS (Symbian Press)
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know.

The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identifying and explaining the topics examined. Each of the exam's objectives is succinctly...

CCNA Security Course Booklet, Version 1.0
CCNA Security Course Booklet, Version 1.0

The Cisco CCNA Security curriculum provides a comprehensive overview of contemporary network security, helping Cisco Networking Academy students systematically prepare for the latest CCNA Security exam. While extensive online study resources are available, many students and instructors have requested a low-cost printed resource that can be...

Microsoft Excel 2000 Functions in Practice (Que Quick Reference)
Microsoft Excel 2000 Functions in Practice (Que Quick Reference)
The Microsoft Excel 2000 Functions in Practice provides in-depth information on the functions that will maximize your use of the analytical tools within Excel 2000. Packed with examples and detailed insight into both the functions and their uses, this reference includes more than just discussions of the functions—it offers practical,...
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation deals with enterprise resource planning (ERP) systems implementation, and also business operations/processes and information systems to support business operations/processes. There are a large number of books treating ERP implementation, operations management and information systems...
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
CCNA Portable Command Guide (2nd Edition) (Self-Study Guide)
Scott Empson is currently the associate chair of the bachelor of applied information systems technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, teaching Cisco® routing, switching, and network design courses in certificate, diploma, and applied degree programs at the post-secondary level. He...
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

CCNP BSCI Portable Command Guide (Self-Study Guide)
CCNP BSCI Portable Command Guide (Self-Study Guide)

Preparing for the CCNP® certification? Working as a network professional? Here are all the CCNP-level commands for the Building Scalable Cisco Internetworks (BSCI) exam you need in one condensed, portable resource. The CCNP BSCI Portable Command Guide is filled with valuable, easy-to-access information and is portable...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy