|
|
|
|
|
Disadvantaged Children in India: Empirical Evidence, Policies and Actions
This book addresses issues concerning five major categories of disadvantaged children, namely street children, children involved in trafficking, child labor, slum children, and children in institutional care, which apply to a large number of children around the world, including India. Compiling primary and secondary research-based evidences in... | | Titanium Microalloyed Steel: Fundamentals, Technology, and Products
This book comprehensively reviews the research on Ti microalloyed steel, focusing on development and production technology. It discusses steel composition design and performance, as well as technologies for controlling the microstructure and properties of Ti microalloyed steel during the production process. Ti can significantly improve ... | | Negation and Speculation Detection (Natural Language Processing)
Negation and speculation detection is an emerging topic that has attracted the attention of many researchers, and there is clearly a lack of relevant textbooks and survey texts. This book aims to define negation and speculation from a natural language processing perspective, to explain the need for processing these phenomena, to summarise... |
|
Database Access with Visual Basic® .NET, Third EditionDatabase Access with Visual Basic .NET continues to use techniques developed by Jeffrey McManus that provide solutions to problems faced by developers every day. Since data access is the most used feature in corporate development, it is important for developers to understand the most effective and efficient way... | | CCNP Practical Studies: Remote Access (CCNP Self-Study)
Gain hands-on experience of CCNP Remote Access topics with lab scenarios for the new 642-821 BCRAN exam.
-
Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts
-
Experience how remote access... | | Security + Exam Guide (Testtaker's Guide Series)The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those topics most likely to be addressed on the exam. Written by an experienced network administrator and CompTIA... |
|
Verilog® HDL: A Guide to Digital Design and Synthesis, Second EditionWritten for both experienced and new users, this book gives you broad coverage of Verilog HDL. The book stresses the practical design and verification perspective ofVerilog rather than emphasizing only the language aspects. The informationpresented is fully compliant with the IEEE 1364-2001 Verilog HDL standard.
... | | Hibernate: A J2EE™ Developer's GuideBuild fast, high-performance Java database applications with Hibernate.
Hibernate makes it far easier to build robust, high-performance database applications with Java. Now there's a practical, hands-on guide to using Hibernate's flexible, fast object/relational persistence and query services. Will Iverson covers every facet of... | | Linux on the Mainframe Linux on the Mainframe is the comprehensive guide to the fastest growing trend in IT. IBM's Linux experts present peerless instruction in the art of planning for and making the most of a Linux mainframe. This book's in-depth coverage includes virtualization, deployment, data management,... |
|
|
Result Page: 2369 2368 2367 2366 2365 2364 2363 2362 2361 2360 2359 2358 2357 2356 2355 2354 2353 2352 2351 |