Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Do Everything with PowerPoint(R)
How to Do Everything with PowerPoint(R)
Follow real-world examples in this get-you-going guide and create your own PowerPoint presentations--from simple to dazzlingly sophisticated. Prepare slide shows--which you can show on a projection screen or computer monitor--featuring animation, sound, graphics, and even video clips. Edit and format text, add graphs and diagrams, include...
Playing with Videogames
Playing with Videogames
This book enlarges the discussion of mobility from tools and technologies to employees working in multiple places and between them Matti Vartiainen (Helsinki University of Technology, Finland)

Playing with Videogames documents the richly productive, playful and social cultures of videogaming that support, surround and sustain
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Fiber Based Dispersion Compensation (Optical and Fiber Communications Reports)
Fiber Based Dispersion Compensation (Optical and Fiber Communications Reports)

A pulse of light spreads in time as it propagates in a fiber due to the physical phenomenon called dispersion. While dispersion can be deleterious in optical communications systems, it can also be exploited to manage the temporal and spectral shapes of pulses and their interactions with other pulses. Much of dispersion control is realized in...

The Law, In Plain English, For Photographers
The Law, In Plain English, For Photographers
The photographer's definitive business and legal resource is now completely updated and expanded. In this valuable guide, arts attorney Leonard DuBoff takes you step by step though all the legal aspects of the photography business. Here is expert advice for everything from contracts to trademarks, including government licenses, taxes, censorship,...
The Art of XSD - SQL Server XML schemas
The Art of XSD - SQL Server XML schemas

When information is exchanged in XML format, there needs to be an agreement between the sender and receiver about the structure and content of the XML document. An XSD (XML Schema Definition Language) Schema can be used to enforce this contract and validate the XML data being exchanged and, given that a lot of applications exchange...

AI Techniques for Game Programming (Premier Press Game Development)
AI Techniques for Game Programming (Premier Press Game Development)

"AI Techniques for Game Programming" takes the difficult topics of genetic algorithms and neural networks and explains them in plain English. Gone are the tortuous mathematic equations and abstract examples to be found in other books. Each chapter takes readers through the theory a step at a time, explaining clearly how they can...

The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages of the human speech communication process. This process, sometimes referred to as speech chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with the arrival of the message in the...
Constant Mean Curvature Surfaces with Boundary (Springer Monographs in Mathematics)
Constant Mean Curvature Surfaces with Boundary (Springer Monographs in Mathematics)

The study of surfaces with constant mean curvature (CMC) is one of the main topics in classical differential geometry. Moreover, CMC surfaces are important mathematical models for the physics of interfaces in the absence of gravity, where they separate two different media or for capillary phenomena. Further, as most techniques used in the...

Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)
Advances in Information and Communication: Proceedings of the 2019 Future of Information and Communication Conference (FICC), Volume 1 (Lecture Notes in Networks and Systems)

This book presents a remarkable collection of chapters that cover a wide range of topics in the areas of information and communication technologies and their real-world applications. It gathers the Proceedings of the Future of Information and Communication Conference 2019 (FICC 2019), held in San Francisco, USA from March 14 to 15,...

unlimited object storage image
Result Page: 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy