Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
SEO Warrior
SEO Warrior

I was compelled to write SEO Warrior for many reasons. Every day, thousands of sites are born in the hopes of making it big. Most of them will fail before achieving their goals. Many site owners create their sites blindly, without conducting proper research. Many site owners do not even know what search engine optimization (SEO) is and what its...

Introduction to Information Theory and Data Compression, Second Edition
Introduction to Information Theory and Data Compression, Second Edition
An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires...
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Fundamentals of Logic Design (with Companion CD-ROM)
Fundamentals of Logic Design (with Companion CD-ROM)

After studying this text, you should be able to apply switching theory to the solution of logic design problems.This means that you will learn both the basic theory of switching circuits and how to apply it. After a brief introduction, you will study Boolean algebra, which is the basic mathematical tool needed to analyze and synthesize...

The Gale Encyclopedia Of Cancer: A Guide To Cancer And Its Treatments (Gale Encyclopedia of Cancer) 2 Volume Set
The Gale Encyclopedia Of Cancer: A Guide To Cancer And Its Treatments (Gale Encyclopedia of Cancer) 2 Volume Set
Unfortunately, man must suffer disease. Some diseases are totally reversible and can be effectively treated. Moreover, some diseases with proper treatment have been virtually annihilated, such as polio, rheumatic fever, smallpox, and, to some extent, tuberculosis. Other diseases seem to target one organ, such as the heart,...
Food Carbohydrate Chemistry
Food Carbohydrate Chemistry
Carbohydrates are major components of foods, accounting for more than 90% of the dry matter of fruits and vegetables and providing for 70-80% of human caloric intake worldwide (BeMiller and Huber 2008). Thus, from a quantitative perspective alone, carbohydrates warrant the attention of food chemists. From the standpoint of food...
Industrial Problem Solving Simplified: An 8-Step Program
Industrial Problem Solving Simplified: An 8-Step Program

Industrial Problem Solving Simplified provides a roadmap for solving manufacturing problems. Containing numerous examples of actual problems and their solutions in various industrial environments, it is for novice as well as experienced manufacturing owners, managers, quality representatives, consultants, trainers, and procurement...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks (SpringerBriefs in Computer Science)
Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks (SpringerBriefs in Computer Science)

This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this problem, each chapter introduces a different distributed strategy for solving...

BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
The origins of this book are part of an interesting period of my life. A period that
saw me move from a shy and disorganized young adult, into a software developer
who has toured various parts of the world, and met countless new friends and
colleagues. It all began in December of 2001, nearly five years ago. I started a
project
...
unlimited object storage image
Result Page: 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy