Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Handbook of Firearms and Ballistics: Examining and Interpreting Forensic Evidence
Does the gunshot residue reveal how far from the target a weapon was fired? Is there any trace evidence to prove the accused handled a specific firearm? What is the likely behaviour of a ricocheting bullet? Do the marks on a bullet prove categorically that it was fired from a particular weapon? These are all issues (amongst others) that the fully...
Better Than Bullet Points: Creating Engaging e-Learning with PowerPoint
Better Than Bullet Points: Creating Engaging e-Learning with PowerPoint
This book focuses exclusively on the application of PowerPoint to the creation of online training programs. Better than Bullet Points, Creating Engaging e-Learning with PowerPoint fills that gap. By providing in-depth guidance, specific instructions, and helpful exercises, the book will enable training practitioners to create...
Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations that Inform, Motivate, and Inspire
Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations that Inform, Motivate, and Inspire

Unlock the amazing story buried in your presentation—and forget boring, bullet-point-riddled slides forever! Guided by communications expert Cliff Atkinson, you’ll walk you through an innovative, three-step methodology for increasing the impact of your presentation. Discover how to combine classic storytelling techniques...

Advanced Memory Optimization Techniques for Low-Power Embedded Processors
Advanced Memory Optimization Techniques for Low-Power Embedded Processors
The design of embedded systems warrants a new perspective because of the following two reasons: Firstly, slow and energy inefficient memory hierarchies have already become the bottleneck of the embedded systems. It is documented in the literature as the memory wall problem. Secondly, the software running on the contemporary embedded devices is...
Oracle 11g Streams Implementer's Guide
Oracle 11g Streams Implementer's Guide

This Preface and the entire book are a little bit different—and that is by design. Both authors wrote this book understanding that our target audience often does not have time to read a whole book, or the Oracle documentation, from cover to cover. As such, we wrote this book with the idea that the table of contents and headings should tell...

The Dark Side of Game Texturing
The Dark Side of Game Texturing

A perfect and direct starting point for a beginner game texture artist! "The Dark Side of Game Texturing" is also an excellent reference for intermediate artists, or for those who want to further their digital art skills. Learn how to create game textures similar to the eerie, sinister, and ominous textures seen in great video games...

Understanding Intracardiac EGMs and ECGs
Understanding Intracardiac EGMs and ECGs

This practical “how-to” manual for interpreting electrograms and understanding how they relate to the more easily understood/obtained electrocardiogram (ECG) is designed to be used in electrophysiology laboratories and during preparation for certification tests. Clear enough to be understood by the novice, this inexpensive paperback...

Telling Stories: A Short Path to Writing Better Software Requirements
Telling Stories: A Short Path to Writing Better Software Requirements

From systems designers to top management, everyone loves a good story

Once upon a time, it was well understood that stories teach better than plain facts. Why then are most software requirements documents a baffling hodge-podge of diagrams, data dictionaries, and bullet points, held together by little more than a name and a staple?...

Celebrities and Crime (Criminal Investigations)
Celebrities and Crime (Criminal Investigations)
The public's fascination with celebrities can reach a fever pitch when celebrities commit or are involved in a crime. Famous victims like the Lindbergh baby and Sharon Tate have raised public outcry against the cruel crimes that claimed their lives. And the trials of celebrity criminals such as Jim Bakker and O.J. Simpson are proof that even the...
UML Xtra-Light: How to Specify Your Software Requirements
UML Xtra-Light: How to Specify Your Software Requirements
The excellent idea of writing a lightweight book on the Unified Modeling Language (UML) wasn't ours, we admit. This idea originated from Milan's customers. Having taught more than a hundred courses and seminars on omponent approaches to software development and on UML over the past few years, he was repeatedly asked for 'UML made easy' for people...
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Compositing Visual Effects: Essentials for the Aspiring Artist
Compositing Visual Effects: Essentials for the Aspiring Artist
Put the essential concepts and techniques of digital compositing to work for you without the need of a single mathematical equation. Compositing Visual Effects is lavishly illustrated with hundreds of film shots, figures, illustrations and diagrams to help the visual reader gain a valuable vocabulary and understanding of the full range of visual...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy