Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Police work deals with human nature, which is always changing and, therefore, constantly poses new challenges for the law enforcement officer. The skills learned in basic police training are just that — basic. Officers must seek continual training to keep up with their criminal counterparts.

The investigation of crimes such as
...
Fuzzy Control Systems
Fuzzy Control Systems
Must reading for anyone interested in acquiring a thorough understanding of fuzzy logic, its role in soft computing, and its application to control and related fields.

-Lotfi A. Zadeh
From the Foreword

Fuzzy Control Systems explores one of the most active areas of research involving fuzzy set theory. The
...
The Developer's Guide to Debugging
The Developer's Guide to Debugging

Software has bugs. Period.

That's true, unfortunately. Even the good old "hello, world" program, known to virtually every C and C++ programmer in the world, can be considered to be buggy. Developing software means having to deal with defects; old ones, new ones, ones you created yourself, and those that others brought to life....

Office VBA Macros You Can Use Today: Over 100 Amazing Ways to Automate Word, Excel, PowerPoint, Outlook, and Access
Office VBA Macros You Can Use Today: Over 100 Amazing Ways to Automate Word, Excel, PowerPoint, Outlook, and Access
A simple macro language appeared in version 3 of VisiCalc. When Lotus 1-2-3 introduced the keystroke macro recorder, accountants everywhere began developing arcane little macros to automate the daily task of importing and formatting sales data in their spreadsheets. When Excel 5 shipped with a new macro language called VBA in 1993, the world...
Beginning Google Web Toolkit: From Novice to Professional
Beginning Google Web Toolkit: From Novice to Professional
The open source, lightweight Google Web Toolkit (GWT) is a framework that allows Java developers to build Rich Internet Applications (RIA), more recently called Ajax applications, in Java. Typically, writing these applications requires a lot of JavaScript development. However, Java and JavaScript are very distinctively different languages (although...
Introduction to Random Signals and Noise
Introduction to Random Signals and Noise

Random signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.

With a strong mathematical grounding, this text...

The Power PC Compiler Writer's Guide
The Power PC Compiler Writer's Guide
This book describes, mainly by coding examples, the code patterns that perform well on PowerPC processors. The book will be particularly helpful to compiler developers and application-code specialists who are already familiar with optimizing compiler technology and are looking for ways to exploit the PowerPC architecture. It will also be helpful to...
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217) is the perfect study guide to help you pass one of the four core exams in Microsoft's Windows 2000 certification program. This certification exam measures the ability to install, configure, and troubleshoot the Windows 2000 Active Directory components, DNS for...
Refrigeration and Air Conditioning
Refrigeration and Air Conditioning
This text pretends the analytical statement of the refrigeration and acondiontioning air jumps straightforward. And today, more than ever, specially in these times in which the environmental concerns are subject of first degree in every corner of the world.

How is it possible maintain the wished equilibrium between comfort and
...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
unlimited object storage image
Result Page: 2375 2374 2373 2372 2371 2370 2369 2368 2367 2366 2365 2364 2363 2362 2361 2360 2359 2358 2357 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy