Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Objective-C Design Patterns for iOS
Pro Objective-C Design Patterns for iOS

It’s time to capitalize on your mastery of Cocoa with Pro Objective-C Design Patterns for iOS. You’ve developed apps that impressed and performed, and now you’re ready to jump into development practices that will leave you with more effective, efficient, and professional level apps. This book is the...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Poser 6 Revealed: The Official Guide
Poser 6 Revealed: The Official Guide
Get ready to explore all that Poser has to offer! Giving you a firm foundation, "Poser 6 Revealed: The Official Guide" allows you to master concepts on both a technical and artistic level. Begin by examining the concept behind each task—the goal and the necessary features that are involved. Then go in-depth with the objective of...
Molecular Pathology and Diagnostics of Cancer (Cancer Growth and Progression)
Molecular Pathology and Diagnostics of Cancer (Cancer Growth and Progression)

Molecular pathology is based on the emergence of new techniques that greatly enhance the diagnostic accuracy when facing with challenging differential diagnoses. In addition, new molecular techniques are entering the clinical arena for their value in predicting therapy response and tumor prognosis. This book provides a guide for the...

Object Oriented Simulation: A Modeling and Programming Perspective
Object Oriented Simulation: A Modeling and Programming Perspective

Object Oriented Simulation will qualify as a valuable resource to students and accomplished professionals and researchers alike, as it provides an extensive, yet comprehensible introduction to the basic principles of object-oriented modeling, design and implementation of simulation models.

Key features include an introduction...

Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena
Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena

In Scandinavian Colonialism and the Rise of Modernity: Small Time Agents in a Global Arena, archaeologists, anthropologists, and historians present case studies that focus on the scope and impact of Scandinavian colonial expansion in the North, Africa, Asia and America as well as within Scandinavia itsself. They discuss early...

Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)
Handbook of Exchange Rates (Wiley Handbooks in Financial Engineering and Econometrics)

Praise for Handbook of Exchange Rates

“This book is remarkable. I expect it to become the anchor reference for people working in the foreign exchange field.”

—Richard K. Lyons, Dean and Professor of Finance, Haas School of Business, University of California...

Smashing WebKit (Smashing Magazine Book Series)
Smashing WebKit (Smashing Magazine Book Series)

The ultimate guide to WebKit from the world's most popular resource for web designers and developers

As the default browser for both iPhone and Android, WebKit has become a major player in the mobile arena, offering a wider array of HTML5 and CSS3 support than any other major engine. Written by expert author Jon Raasch,...

Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)
Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)

Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code...

Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Fabrication of SiGe HBT BiCMOS Technology
Fabrication of SiGe HBT BiCMOS Technology
While the idea of cleverly using silicon–germanium (SiGe) and silicon (Si) strained-layer epitaxy to practice bandgap engineering of semiconductor devices in the highly manufacturable Si material system is an old one, only in the past decade has this concept become a practical reality. The final success of creating novel Si...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy