Home | Amazing | Today | Tags | Publishers | Years | Search 
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Wireless communications is growing at a phenomenal rate. From 1991 to 1999, the number of subscribers increased from about 25 million to over 250 million. Incredibly, over the next seven years, the number. of subscribers is expected to quadruple, to over 1 billion [ 1]. That growth rate is faster than that of any other consumer...
Adobe Photoshop Lightroom 4 Classroom in a Book
Adobe Photoshop Lightroom 4 Classroom in a Book
Adobe® Photoshop® Lightroom® delivers a complete workflow solution for the digital photographer—from importing, reviewing, organizing, and enhancing digital images to publishing photos, producing client presentations, creating photo books and web galleries, and outputting high-quality prints. The user...
Adobe Flash Professional CS6 Classroom in a Book
Adobe Flash Professional CS6 Classroom in a Book

 

Adobe Flash Professional CS6 provides a comprehensive authoring environment for creating interactive and media-rich applications. Flash is widely used to create engaging projects integrating video, sound, graphics, and animation. You can create original content in Flash or import assets from other Adobe...

Audel HVAC Fundamentals, Heating System Components, Gas and Oil Burners and Automatic Controls
Audel HVAC Fundamentals, Heating System Components, Gas and Oil Burners and Automatic Controls
The purpose of this series is to provide the layman with an introduction to the fundamentals of installing, servicing, troubleshooting, and repairing the various types of equipment used in residential and light-commercial heating, ventilating, and air conditioning (HVAC) systems. Consequently, it was written not only for the...
Regular Expressions Cookbook
Regular Expressions Cookbook
Over the past decade, regular expressions have experienced a remarkable rise in popularity. Today, all the popular programming languages include a powerful regular expression library, or even have regular expression support built right into the language. Many developers have taken advantage of these regular...
Moodle Gradebook
Moodle Gradebook
Moodle is used in many areas of education to provide a range of resources and activities to support learning. However, it can also be used to manage learning and record progress.

This book will explain the uses of the Moodle grades area, also known as the Gradebook, to record grades for work completed and to
...
Adobe InDesign CS6 Classroom in a Book
Adobe InDesign CS6 Classroom in a Book
Welcome to Adobe® InDesign® CS6, a powerful design and production application that offers precision, control, and seamless integration with other Adobe professional graphics software. Using InDesign, you can produce professional-quality, full-color documents on high-volume color printing presses, or print to a range of...
Logic of Analog and Digital Machines
Logic of Analog and Digital Machines
Computer Science is a very young discipline compared to most others. Alan Turing published the seminal paper of the field in 1936. Around the same time, the militaries in Germany, UK, and US commissioned the first digital electronic computer projects. One of these, the Colossus at Bletchley Park in the UK, was used to break the...
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology
Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology

In Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology, Jim Weaver, Weiqi Gao, Stephen Chin, Dean Iverson, and Johan Vos show you how you can use the JavaFX platform to create rich-client Java applications. You'll see how JavaFX provides a powerful Java-based UI platform capable...

CCNP Security IPS 642-627 Official Cert Guide
CCNP Security IPS 642-627 Official Cert Guide

Learn, prepare, and practice for exam success

 

CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,...

Result Page: 754 753 752 751 750 749 748 747 746 745 744 743 742 741 740 739 738 737 736 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy