Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Polyurethane and Related Foams: Chemistry and Technology
Polyurethane and Related Foams: Chemistry and Technology
Polyurethane foams debuted over 60 years ago. At the present time these types of foams make up the largest segment in the thermosetting foam industry. This book describes polyurethane (PUR) and urethane linkage-modified polyisocyanurate (PIR) foams. A characteristic of these foams lies in the versatility of their physical...
OpenStack Cloud Computing Cookbook - Second Edition
OpenStack Cloud Computing Cookbook - Second Edition

Over 100 recipes to successfully set up and manage your OpenStack cloud environments with complete coverage of Nova, Swift, Keystone, Glance, Horizon, Neutron, and Cinder

Overview

  • Updated for OpenStack Grizzly
  • Learn how to install, configure, and manage all of the OpenStack core projects...
Principles & Practice of Pain Management
Principles & Practice of Pain Management
The best textbook on pain management! This comprehensive resource covers every aspect of diagnosing and treating specific pain conditions and syndromes. Features a concise introduction to basic concepts in pain management, plus an expanded section on evaluation and assessment techniques.

Harvard Medical
...
Mudbox 2013 Cookbook
Mudbox 2013 Cookbook
Sculpting software has changed the face of the 3D industry. Whether you are creating a character for the next Avatar movie or adding details to a post apocalyptic city in The Last of Us, 3D sculpting has become an essential tool for creating a level of realism in digital art that was much harder to achieve in the past. A couple of...
iOS Programming: The Big Nerd Ranch Guide (3rd Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (3rd Edition) (Big Nerd Ranch Guides)

 Updated and expanded to cover iOS 5 and Xcode 4.3, iOS Programming: The Big Nerd Ranch Guide leads you through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, you will have the understanding, the know-how, and the confidence you need to tackle iOS projects of your own....

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Radar Principles
Radar Principles
A comprehensive introduction to radar principles

This volume fills a need in industry and universities for a comprehensive introductory text on radar principles. Well-organized and pedagogically driven, this book focuses on basic and optimum methods of realizing radar operations, covers modern applications, and provides a detailed,...

concrete5 Beginner's Guide - Second Edition
concrete5 Beginner's Guide - Second Edition

concrete5 is a superb content management system and this book will show you how to get going with it. From basic installation through to advanced techniques of customization, it's the perfect primer for web developers.

Overview

  • Create your own theme to customize the look of your site.
  • ...
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)
Microservices with Docker on Microsoft Azure (includes Content Update Program) (Addison-Wesley Microsoft Technology)

Book + Content Update Program

“Beyond just describing the basics, this book dives into best practices every aspiring microservices developer or architect should know.”
—Foreword by Corey Sanders, Partner Director of Program Management, Azure

Microservice-based
...

Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Java EE and .NET Interoperability: Integration Strategies, Patterns, and Best Practices
Evolving Web services standards and technologies offer limited interoperability when it comes to security, management, and other important application characteristics. Successful interoperability solutions require comprehensive integration strategies that go beyond simple connections. The capability to mitigate security and reliability risks and...
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy