Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Computational Introduction to Number Theory and Algebra
A Computational Introduction to Number Theory and Algebra
"This is an outstanding and well-written book whose aim is to introduce the reader to a broad range of material -- ranging from basic to relatively advanced -- without requiring any prior knowledge on the part of the reader other than calculus and mathematical maturity. That the book succeeds at this goal is quite an accomplishment! ...this...
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation deals with enterprise resource planning (ERP) systems implementation, and also business operations/processes and information systems to support business operations/processes. There are a large number of books treating ERP implementation, operations management and information systems...
Effective Knowledge Transfer in Multinational Corporations
Effective Knowledge Transfer in Multinational Corporations
Those who have really enabled this research – and will, I hope, also benefit from its outcome at one point or other – are the managers who participated in the study. I hope my lengthy questionnaire and my numerous follow-up calls have not discouraged them to support further empirical studies. Special thanks go to my advisers, Professors...
CCA Citrix Metaframe: Citrix Metaframe XP 1.0 Administration
CCA Citrix Metaframe: Citrix Metaframe XP 1.0 Administration
Here's the book you need to prepare for exam 220, Citrix MetaFrame XP 1.0 for Windows Administration. This study guide provides:

In-depth coverage of every exam objective Practical information on administering MetaFrame XP 1.0 for Windows Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software,...

Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network

Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...

Dynamic HTML: The Definitive Reference
Dynamic HTML: The Definitive Reference
Danny Goodman felt that he couldn't trust any of the documentation on Dynamic HTML (DHTML) that he read (too many contradictions), so he wrote this book as a reference for working with his own clients. After testing tags and techniques on multiple releases of the main browsers, Goodman came up with very practical information--some of which you may...
Access 2003 Bible
Access 2003 Bible
Welcome to the Access 2003 Bible—your personal guide to a powerful, easyto-
use database management system. This book is in its ninth revision and
has been totally re-written for Microsoft Office Access 2003 with new text, new pictures,
and a completely new and improved set of example files.

This book examines Access
...
Sams Teach Yourself Wireless Java with J2ME in 21 Days
Sams Teach Yourself Wireless Java with J2ME in 21 Days

Sams Teach Yourself Wireless Java with J2ME in 21 Days begins by establishing the basic parameters of J2ME development and its uses in building wireless applications. The tutorial chapters introduce both text and graphical application development for typical wireless devices. Finally, the book presents the major types of...

Voice and Speech Quality Perception: Assessment and Evaluation (Signals and Communication Technology)
Voice and Speech Quality Perception: Assessment and Evaluation (Signals and Communication Technology)
Foundations of Voice and Speech Quality Perception starts out with the fundamental question of: "How do listeners perceive voice and speech quality and how can these processes be modeled?" Any quantitative answers require measurements. This is natural for physical quantities but harder to imagine for perceptual measurands. This book...
Blues Guitar For Dummies (Computer/Tech)
Blues Guitar For Dummies (Computer/Tech)
Packed with musical examples, chord charts, and photos

Re-create the sounds of the blues masters--without reading music!

Want to play the blues? Can't read music? No problem! This fun, accessible guide shows you how to play blues scales, chords, progressions, riffs, and solos. From Delta blues and modern blues
...
unlimited object storage image
Result Page: 2377 2376 2375 2374 2373 2372 2371 2370 2369 2368 2367 2366 2365 2364 2363 2362 2361 2360 2359 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy