Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theoretical Introduction to Programming
Theoretical Introduction to Programming
Including easily digested information about fundamental techniques and concepts in software construction, this book is distinct in unifying pure theory with pragmatic details. Driven by generic problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to...
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Industrial Problem Solving Simplified: An 8-Step Program
Industrial Problem Solving Simplified: An 8-Step Program

Industrial Problem Solving Simplified provides a roadmap for solving manufacturing problems. Containing numerous examples of actual problems and their solutions in various industrial environments, it is for novice as well as experienced manufacturing owners, managers, quality representatives, consultants, trainers, and procurement...

Learning OMNeT++
Learning OMNeT++

Make realistic and insightful network simulations with OMNeT++

Overview

  • Create a virtual Network Simulation Environment rapidly
  • Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
  • Learn how to...
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Brain Damage and Repair: From Molecular Research to Clinical Therapy
Brain Damage and Repair: From Molecular Research to Clinical Therapy

This book builds a novel bridge from molecular research to clinical therapy. This approach reveals the functional features of neurons and glia in the particular context of vulnerability and self-protection, intracellular properties and extracellular matrix. Arising from this platform, this volume unfolds the molecular and systemic processes...

Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS
Beginning ARKit for iPhone and iPad: Augmented Reality App Development for iOS

Explore how to use ARKit to create iOS apps and learn the basics of augmented reality while diving into ARKit specific topics. This book reveals how augmented reality allows you to view the screen on an iOS device, aim the camera at a nearby scene, and view both the real items in that scene as well as a graphic image overlaid on to...

Managing Power Electronics: VLSI and DSP-Driven Computer Systems
Managing Power Electronics: VLSI and DSP-Driven Computer Systems
This book discusses state-of-the-art power management techniques of
modern electronic appliances relying on such Very Large Scale Integration
(VLSI) chips as CPUs and DSPs.

It also covers specific circuit design issues and their implications,
including original derivation of important expressions.
This book is geared
...
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Police work deals with human nature, which is always changing and, therefore, constantly poses new challenges for the law enforcement officer. The skills learned in basic police training are just that — basic. Officers must seek continual training to keep up with their criminal counterparts.

The investigation of crimes such as
...
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217) is the perfect study guide to help you pass one of the four core exams in Microsoft's Windows 2000 certification program. This certification exam measures the ability to install, configure, and troubleshoot the Windows 2000 Active Directory components, DNS for...
Enterprise Development with Flex: Best Practices for RIA Developers (Adobe Dev Lib)
Enterprise Development with Flex: Best Practices for RIA Developers (Adobe Dev Lib)

If you want to use Adobe Flex to build production-quality Rich Internet Applications for the enterprise, this groundbreaking book shows you exactly what's required. You'll learn efficient techniques and best practices, and compare several frameworks and tools available for RIA development -- well beyond anything you'll...

unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy