Home | Amazing | Today | Tags | Publishers | Years | Search 
Architecting Mobile Solutions for the Enterprise
Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Oracle SOA Infrastructure Implementation Certification Handbook (1Z0-451)
Oracle SOA Infrastructure Implementation Certification Handbook (1Z0-451)
Certification is the first big step towards getting yourself recognized in the extremely large developer community. It demonstrates that you have a working knowledge, and gives you an edge in the market space and employment space. It helps you to get a better salary through promotions or increments in a few cases.

Completing
...
Hydrodynamics Around Cyclindrical Structures (Advanced Series on Ocean Engineering)
Hydrodynamics Around Cyclindrical Structures (Advanced Series on Ocean Engineering)

This book discusses the subject of wave/current flow around a cylinder, the forces induced on the cylinder by the flow, and the vibration pattern of slender structures in a marine environment. The primary aim of the book is to describe the flow pattern and the resulting load which develops when waves or current meet a cylinder. Special...

The Mathematics of Computerized Tomography (Classics in Applied Mathematics)
The Mathematics of Computerized Tomography (Classics in Applied Mathematics)

By computerized tomography (CT) we mean the reconstruction of a function from its line or plane integrals, irrespective of the field where this technique is applied. In the early 1970s CT was introduced in diagnostic radiology and since then, many other applications of CT have become known, some of them preceding the application in radiology...

Compiler Construction Using Java, JavaCC, and Yacc
Compiler Construction Using Java, JavaCC, and Yacc

Broad in scope, involving theory, the application of that theory, and programming technology, compiler construction is a moving target, with constant advances in compiler technology taking place. Today, a renewed focus on do-it-yourself programming makes a quality textbook on compilers, that both students and instructors will enjoy using, of...

Know and Understand Centrifugal Pumps
Know and Understand Centrifugal Pumps
Very few industrial pumps come out of service and go into the maintenance shop because the volute casing or impeller split down the middle, or because the shaft fractured into four pieces. The majority of pumps go into the shop because the bearings or the mechanical seal failed.

Most mechanics spend their time
...
Mechanisms in Organic Reactions
Mechanisms in Organic Reactions
The wonderful complexity of organic chemistry involves thousands of different reactions which allow the synthesis and interconversions of millions of compounds, some of great complexity. The key to understanding this vital branch of chemistry is the concept of the reaction mechanism.

This book starts with a
...
Internet Fraud Casebook: The World Wide Web of Deceit
Internet Fraud Casebook: The World Wide Web of Deceit

Real case studies on Internet fraud written by real fraud examiners

Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive,...

Defensive Database Programming with SQL Server
Defensive Database Programming with SQL Server

Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as...

IT-Driven Business Models: Global Case Studies in Transformation
IT-Driven Business Models: Global Case Studies in Transformation

A look at business model innovation's crucial role in today's global business environment .

Showing organizations how business model innovation should be a key focus area in today's global economy, this book features cases from businesses around the globe that have developed customized business models and achieved...

Real World Functional Programming: With Examples in F# and C#
Real World Functional Programming: With Examples in F# and C#

Functional programming languages like F#, Erlang, and Scala are attracting attention as an efficient way to handle the new requirements for programming multi-processor and high-availability applications. Microsoft's new F# is a true functional language and C# uses functional language features for LINQ and other recent...

Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy