Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Java: The Complete Reference, Ninth Edition
Java: The Complete Reference, Ninth Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The Definitive Java Programming Guide

Fully updated for Java SE 8, Java: The Complete Reference, Ninth Edition...

The Canon EOS Digital Rebel T1i/500D Companion
The Canon EOS Digital Rebel T1i/500D Companion
Through easy-to-follow lessons, this handy book offers a complete class on digital photography, tailored specifically for people who use the Canon EOS Digital Rebel T1i/500D. This is not your typical camera guide: rather than just show you what all the buttons do, it teaches you how to use the Digital Rebel's features to make great...
Cocoa Programming Developer's Handbook
Cocoa Programming Developer's Handbook

The Cocoa programming environment—Apple’s powerful set of clean, object-oriented APIs—is increasingly becoming the basis of almost all contemporary Mac OS X development. With its long history of constant refinement and improvement, Cocoa has matured into a sophisticated programming environment that can make...

The AWK Programming Language
The AWK Programming Language

Computer users spend a lot of time doing simple, mechanical data manipulation - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like. All of these jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose program in a...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Language Grounding in Robots
Language Grounding in Robots

Written by leading international experts, this volume presents contributions establishing the feasibility of human language-like communication with robots. The book explores the use of language games for structuring situated dialogues in which contextualized language communication and language acquisition can take place. Within the text are...

Web ReDesign 2.0: Workflow that Works
Web ReDesign 2.0: Workflow that Works

If anything, this volume's premisethat the business of Web design is one of constant changehas only proven truer over time. So much so, in fact, that the 12-month design cycles cited in the last edition have shrunk to 6 or even 3 months today. Which is why, more than ever, you need a smart,...

VB.NET: Your Visual Blueprint for Building Versatile Programs on the .NET Framework (With CD-ROM)
VB.NET: Your Visual Blueprint for Building Versatile Programs on the .NET Framework (With CD-ROM)
Each step in this great guide is displayed with callouts so you can see exactly where the action takes place on the screen. VB.NET functions are thoroughly covered, including designing forms and controls, using multimedia and databases, integrating VB.NET with ASP.NET, and creating server-side Web applications. This book also includes a special...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Kalman Filtering: Theory and Practice Using MATLAB
Kalman Filtering: Theory and Practice Using MATLAB

From Reviews of the First Edition

"An authentic magnum opus worth much more than its weight in gold!"
IEEE Transactions on Automatic Control

The proven textbook on Kalman filtering—now fully updated, revised, and expanded

...

Perspectives in Cancer Prevention-Translational Cancer Research
Perspectives in Cancer Prevention-Translational Cancer Research

Being a complex disease that affects millions of people world over, cancer research has assumed great significance. Translational cancer research transforms scientific discoveries in the laboratory or population studies into clinical application to reduce incidence of cancer , morbidity and mortality. It is becoming increasingly evident that...

unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy