Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Second Life For Dummies (Computer/Tech)
Second Life For Dummies (Computer/Tech)
You’ve heard all about Second Life. Maybe you’ve already jumped with both feet—and gotten stuck. Or maybe you’re a Second Life veteran who wants to build something or run a business. Fear not! Second Life For Dummies is hear to hold your hand, pat your back, and cheer you on through this new and enchanting reality....
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript

Increase your productivity by implementing complex data structures and algorithms using JavaScript

Key Features

  • A step by step guide, which will provide you with a thorough discussion on the analysis and design of fundamental JavaScript data structures
  • Get a better...
C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Introducing Regular Expressions
Introducing Regular Expressions
This book shows you how to write regular expressions through examples. Its goal is to make learning regular expressions as easy as possible. In fact, this book demonstrates nearly every concept it presents by way of example so you can easily imitate and try them yourself.

Regular expressions
...
Telescope Optics : Complete Manual for Amateur Astronomers
Telescope Optics : Complete Manual for Amateur Astronomers
The authors gratefully acknowledge the help of Klaas Compaan, who was our advisor during the writing of this book. He guarded us against a number of errors and unclarities and also allowed us to publish the data for some of the new optical systems he has designed.

We received further support from Richard Berry, our editor. He invested a
...
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
The annual worldwide sales of cellular phones has exceeded $2.5B. With 4.5 million customers, home satellite networks comprise a $2.5B industry. The global positioning system is expected to become a $5B market by the year 2000. In Europe, the sales of equipment and services for mobile communications will reach $30B by 1998. The statistics are...
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving From Knowledge Management To Wisdom
Inquiring Organizations: Moving from Knowledge Management to Wisdom assembles into one volume a comprehensive collection of the key current thinking regarding the use of C. West Churchman's Design of Inquiring Systems as a basis for computer-based inquiring systems design and implementation. Inquiring systems are systems that go beyond knowledge...
Learn to Tango with D
Learn to Tango with D
In recent years, much work has been put into creating programming languages that embody a blend of many of the most admired characteristics of their predecessors. One such language is D, which provides developers with the speed of languages such as C and C++ combined with the power and flexibility of languages such as Ruby and Python....
Vegan Lunch Box: 130 Amazing, Animal-Free Lunches Kids and Grown-Ups Will Love!
Vegan Lunch Box: 130 Amazing, Animal-Free Lunches Kids and Grown-Ups Will Love!

If you think vegan lunchtime means peanut butter and jelly day after day, think again! Based on the wildly popular blog of the same name, Vegan Lunch Box offers an amazing array of meat-free, egg-free, and dairy-free meals and snacks. All the recipes are organized into menus to help parents pack quick, nutritious, and irresistible...

Unix Shell Programming, Third Edition
Unix Shell Programming, Third Edition

Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power of the shell to solve common problems. The reader learns everything he or she needs to know to...

Broadband Optical Access Networks and Fiber-to-the-Home: Systems Technologies and Deployment Strategies
Broadband Optical Access Networks and Fiber-to-the-Home: Systems Technologies and Deployment Strategies
Broadband Optical Access and Fiber-to-the-Home (FTTH) will provide the ultimate broadband service capabilities.

Compared with the currently well-deployed broadband access technologies of ADSL (Asymmetric Digital Subscriber Line) and Cable Modems, optical broadband access with Fiber-to-the-User’s home will cater for...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy