Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 2 (CIPT2) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, a certified employee/consultant/job candidate is considered more...
Successful Program Management: Complexity Theory, Communication, and Leadership
Successful Program Management: Complexity Theory, Communication, and Leadership

Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.

Filling this void,
...

Mobile 3D Graphics: with OpenGL ES and M3G (The Morgan Kaufmann Series in Computer Graphics)
Mobile 3D Graphics: with OpenGL ES and M3G (The Morgan Kaufmann Series in Computer Graphics)
Graphics and game developers must learn to program for mobility. This book will teach you how.

"This book - written by some of the key technical experts...provides a comprehensive but practical and easily understood introduction for any software engineer seeking to delight the consumer with rich 3D interactive experiences on their
...
ARM Architecture Reference Manual
ARM Architecture Reference Manual
The ARM architecture is the industry's leading 16/32-bit embedded RISC processor solution. ARM Powered microprocessors are being routinely designed into a wider range of products than any other 32-bit processor. This wide applicability is made possible by the ARM architecture, resulting in optimal system solutions at the crossroads of high...
Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line
The failure to adequately address the victims and the emotional dimensions of corporate problems changes adverse events into crises and catastrophes. This book aims to arm employees and managers with the tools necessary to manage emotional distress.

Emotional Terrors in the Workplace: Protecting Your Business' Bottom Line is an...

Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
The influence of embedded systems is constantly growing. Increasingly powerful and versatile devices are being developed and put on the market at a fast pace. The number of features is increasing, and so are the constraints on the systems concerning size, performance, energy dissipation and timing predictability. Since most systems today use a...
Cucumber Recipes: Automate Anything with BDD Tools and Techniques (Pragmatic Programmers)
Cucumber Recipes: Automate Anything with BDD Tools and Techniques (Pragmatic Programmers)

You can test just about anything with Cucumber. We certainly have, and in Cucumber Recipes we'll show you how to apply our hard-won field experience to your own projects. Once you've mastered the basics, this book will show you how to get the most out of Cucumber--from specific situations to advanced test-writing...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Dynamic HTML: The Definitive Reference (2nd Edition)
Dynamic HTML: The Definitive Reference (2nd Edition)
I am going to admit a selfish motive for writing this book and, more recently, updating it to the second edition: I needed the finished product for my own consulting and development work. After struggling in the early Version 4 browser days with tangled online references and monstrous printed versions of Netscape, Microsoft, and World Wide Web...
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)

OpenGL® Programming Guide, Sixth Edition

OpenGL is a powerful software interface used to produce high-quality, computergenerated images and interactive applications using 2D and 3D objects, bitmaps, and color images.

The OpenGL® Programming Guide, Sixth...

101 Facts You Should Know About Food
101 Facts You Should Know About Food

Food is the one thing none of us can do without. Fortunately very few of us in the developed world ever have to. Yet strangely, in these times of plenty, food is talked about more and more. In the past, most people had very little choice over what they ate. Nowadays, we are genuinely spoiled for choice. Supermarkets provide a year-round...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy