Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking MythTV (ExtremeTech)
Hacking MythTV (ExtremeTech)
Want control? Build your own MythTV PC.

You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,...

AutoCAD2008 and AutoCAD LT 2008: No Experience Required
AutoCAD2008 and AutoCAD LT 2008: No Experience Required
Presenting you with the perfect step-by-step introduction to the world’s leading CAD software, this this perennial bestseller is completely revised and features comprehensive, up-to-date coverage of the latest AutoCAD features, such as dynamic blocks, external references, and 3D design. You’ll get concise explanations and practical...
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Algorithmic Game Theory
Algorithmic Game Theory
In the last few years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. More than 40 of the top researchers in this field have written chapters that go from the foundations to the state of the art. Basic chapters on algorithmic methods for equilibria, mechanism design and...
Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings
Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings
This volume contains the papers presented at the Fourth International Conference on Fun with Algorithms (FUN 2007), held June 3–5, 2007 in the beautiful Tuscanian coastal town of Castiglioncello, Italy.

FUN is a three-yearly conference dedicated to the use, design, and analysis of algorithms and data structures, focusing on results
...
Neural Networks Theory
Neural Networks Theory
"Neural Networks Theory is a major contribution to the neural networks literature. It is a treasure trove that should be mined by the thousands of researchers and practitioners worldwide who have not previously had access to the fruits of Soviet and Russian neural network research. Dr. Galushkin is to be congratulated and thanked for his...
The Synthetic Organic Chemists Companion
The Synthetic Organic Chemists Companion
A practical, hands-on guide that belongs in every organic chemistry lab

A unique reference that consolidates essential information in a practical, user-friendly format, The Synthetic Organic Chemist's Companion provides a detailed description

of how to perform synthetic reactions in real-world research settings, covering the most...

The History of Terrorism: From Antiquity to al Qaeda
The History of Terrorism: From Antiquity to al Qaeda
This authoritative work provides an essential perspective on terrorism by offering a rare opportunity for analysis and reflection at a time of ongoing violence, chilling threats, and renewed reprisals. In it, some of the best international specialists working on the subject today examine terrorism's long and complex history from antiquity to the...
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

Binary Digital Image Processing: A Discrete Approach
Binary Digital Image Processing: A Discrete Approach
Binary Digital Image Processing: A Discrete Approach is a comprehensive book on the mathematical foundations of binary digital image processing. It provides a unified theoretical coverage of digital topology, discrete geometry, mathematical morphology and algorithmic graph theory and their applications in image analysis.
...
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to...
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
Embedded Multiprocessors: Scheduling and Synchronization (Signal Processing)
From the Foreword. . . . . .The intellectual content in this book is high. While some of the methods it describes are relatively simple, most are quite sophisticated. Yet examples are given that concretely demonstrate how these concepts can be applied in practical hardware architectures. Moreover, there is very little overlap with other books on...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy