Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Photoshop Elements 7 Book for Digital Photographers
The Photoshop Elements 7 Book for Digital Photographers
 This book breaks new ground by doing something for digital photographers that’s never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure things out on your own. Instead, it does...
Teach Yourself Electricity and Electronics
Teach Yourself Electricity and Electronics
In introductory electronics, Stan Gibilisco wrote the book. The gifted writer/teacher's TEACH YOURSELF ELECTRICITY AND ELECTRONICS is your best choice for clarity, completeness, and up-to-date coverage.

* The best-selling electronics introduction, offering a user-friendly independent study approach
* The quickest way to learn the
...

Creativity Across Domains: Faces of the Muse
Creativity Across Domains: Faces of the Muse
Creativity Across Domains: Faces of the Muse sorts through the sometimes-confusing theoretical diversity that domain specificity has spawned. It also brings together writers who have studied creative thinkers in different areas, such as the various arts, sciences, and communication/leadership. Each contributor explains what is known about the...
Pro Apache Log4j, Second Edition
Pro Apache Log4j, Second Edition
In development scenarios where things can't be run in a debugger, or when you run the risk of masking the problem, logs are the greatest source of information about running a program. Pro Apache Log4j, Second Edition</i> provides best practices guidelines and comprehensive coverage of the most recent release.

Step by step, the book...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
REAL-WORLD WIRELESS SECURITY

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...

IBM Certification Study Guide - Pseries Enterprise Technical Support
IBM Certification Study Guide - Pseries Enterprise Technical Support

This IBM Redbook is designed as a study guide for professionals, wanting to prepare for the certification exam to achieve: IBM Certified Specialist - pSeries Enterprise Technical Support. This technical support certification validates a broad scope of configuration, installation, and planning skills.

This Redbook helps pSeries...

Molecular Pharmacognosy
Molecular Pharmacognosy

"Molecular Pharmacognosy” discusses the application of molecular biology in resource science and authentication of traditional Chinese medicine (TCM). This book reviews the latest developments in pharmacognosy, introduces a series of new views and insights, presents the hotspots and focus of the field of study on molecular...

Computing and Philosophy: Selected Papers from IACAP 2014 (Synthese Library)
Computing and Philosophy: Selected Papers from IACAP 2014 (Synthese Library)

This volume offers very selected papers from the 2014 conference of the “International Association for Computing and Philosophy” (IACAP) - a conference tradition of 28 years. The theme of the papers is the two-way relation between computing technologies and philosophical questions: Computing technologies both raise new...

Online Consumer Psychology: Understanding and Influencing Consumer Behavior in the Virtual World
Online Consumer Psychology: Understanding and Influencing Consumer Behavior in the Virtual World
This volume contains edited versions of papers that were presented at the 2001 Advertising and Consumer Psychology Conference in Seattle, Washington. This annual conference was sponsored by the Society for Consumer Psychology (Division 23 of the American Psychological Association) with sponsorship assistance from Accenture Institute for Strategic...
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably.

Artificial Crime Analysis Systems: Using Computer...

Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop
Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop
These are the proceedings of the 7th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) held in Edinburgh, Scotland from August 29 to September 1, 2005. The CHES workshop has been sponsored by the International Association for Cryptologic Research (IACR) for the last two years.

We received a total of 108 paper
...
unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy