Home | Amazing | Today | Tags | Publishers | Years | Search 
Wicked Cool PHP: Real-World Scripts That Solve Difficult Problems
Wicked Cool PHP: Real-World Scripts That Solve Difficult Problems
PHP is an easy-to-use scripting language perfect for quickly creating the Web features you need. Once you know the basics of how the language works, wouldn't it be great to have a collection of useful scripts that solve those tricky problems and add interesting functionality to your site? We thought so, too.

Instead of starting at "Hello...

Light Field Sampling (Synthesis Lectures on Image, Video, and Multimedia Processing)
Light Field Sampling (Synthesis Lectures on Image, Video, and Multimedia Processing)
Light field is one of the most representative image-based rendering techniques that generate novel virtual views from images instead of 3D models. The light field capture and rendering process can be considered as a procedure of sampling the light rays in the space and interpolating those in novel views. As a result, light field can be studied as a...
The IAF Handbook of Group Facilitation: Best Practices from the Leading Organization in Facilitation
The IAF Handbook of Group Facilitation: Best Practices from the Leading Organization in Facilitation
Sponsored by the International Association of Facilitators, The IAF Handbook of Group Facilitation offers the need-to-know basics in the field brought together by fifty leading practitioners and scholars. This indispensable resource includes successful strategies and methods, foundations, and resources for anyone who works with groups.

The IAF...

Topological Algorithms for Digital Image Processing (Machine Intelligence and Pattern Recognition)
Topological Algorithms for Digital Image Processing (Machine Intelligence and Pattern Recognition)
Objects in three dimensions, and their two-dimensional images, are approximated digitally by sets of voxels ("volume elements") or pixels ("picture elements"), respectively. Digital geometry is the study of geometric properties of digitized objects (or digitized images of objects); it deals both with the definitions of such...
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
Practical TCP/IP and Ethernet Networking for Industry (Practical Professional Books)
One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as the open standard today for all network and communications systems. The reasons for this popularity are not hard to find. TCP/IP and Ethernet are truly open standards available to competing manufacturers and providing the user with a common...
Mobile and Wireless Communications Networks: IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks
Mobile and Wireless Communications Networks: IFIP TC6 / WG6.8 Conference on Mobile and Wireless Communication Networks
This book draws together papers presented at the IFIP/IEEE Sixth Conference on Mobile and Wireless Communications. It focuses on the convergence of mobile wireless networks and the Internet, in particular, integrating stand-alone mobile networks with infrastructure wireless networks to create more robust and accommodating wireless networks....
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Big Change at Best Buy: Working Through Hypergrowth to Sustained Excellence
Big Change at Best Buy: Working Through Hypergrowth to Sustained Excellence

Designed to redefine successful change management in corporate America, Big Change at Best Buy offers hard-won lessons and the tools every executive and manager needs—in every business and every industry—to turn management practices and culture focused on rapid growth into the type of disciplined, customer-centered operation...

Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
When I wrote the first edition of this book, the RS-232 serial port was the workhorse of PC interfaces. Modems and scores of other peripherals connected to PCs via the serial ports that were present on every machine.

When the Universal Serial Bus (USB) took hold in the late 1990s, many predicted that serial ports would soon be obsolete.
...
The Medieval City (Greenwood Guides to Historic Events of the Medieval World)
The Medieval City (Greenwood Guides to Historic Events of the Medieval World)
After a long decline in urban life following the fall of the Roman Empire, towns became centers of trade and of liberty during the medieval period. Here, the author describes how, as Europe stabilized after centuries of strife, commerce and the commercial class grew, and urban areas became an important source of revenue into royal coffers. Towns...
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
WRITTEN BY A LAW ENFORCEMENT PROFESSIONAL FOR OTHER LAW ENFORCEMENT PERSONNEL IN THE TRENCHES This book examines the workings of organized criminals and criminal groups that transcend national boundaries. Discussions include methods used by criminal groups to internationally launder money; law enforcement efforts to counteract such schemes; and...
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Result Page: 2287 2286 2285 2284 2283 2282 2281 2280 2279 2278 2277 2276 2275 2274 2273 2272 2271 2270 2269 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy