Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Artificial Intelligence: A Guide to Intelligent Systems (2nd Edition)
Artificial Intelligence: A Guide to Intelligent Systems (2nd Edition)
Provides a practical introduction to artificial intelligence that is less mathematically rigorous than other books on the market. Appropriate for programmers looking for an overview of all facets of artificial intelligence.

[Shelving Category] Artificial Intelligence/Soft Computing

Artificial Intelligence is often perceived...

Dress and Society: contributions from archaeology
Dress and Society: contributions from archaeology

While traditional studies of dress and jewelry have tended to focus purely on reconstruction or descriptions of style, chronology and typology, the social context of costume is now a major research area in archaeology. This refocusing is largely a result of the close relationship between dress and three currently popular topics: identity,...

Spasmodic Torticollis Handbook: A Guide to Treatment and Rehabilitation
Spasmodic Torticollis Handbook: A Guide to Treatment and Rehabilitation

Spasmodic torticollis, also known as cervical dystonia, affects about three people in 10,000, or an estimated 85,000 individuals in the United States alone. Despite this, there has been until now a lack of information outside of the professional medical literature for use by individuals with this disorder and their families. This book...

Virtual Futures for Design, Construction and Procurement
Virtual Futures for Design, Construction and Procurement
"For the knowledgeable reader in ICT research it is a must to confirm where technology is now and moreover to see where it is going in the future." Building Engineer

Bill Bygrave is the Director of the Center for Entrepreneurial Studies at Babson College, where he also teaches Free Enterprise.
...
Microsoft Expression Web 3 In Depth
Microsoft Expression Web 3 In Depth

Beyond the Basics…Beneath the Surface…In Depth

 

Microsoft Expression Web 3

 

Advice and techniques that you need to get the job done.

 

...
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access (Networking Technology)
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access (Networking Technology)

Wi-Fi Hotspots

Setting Up Public Wireless Internet Access

Installing and operating a Wi-Fi hotspot allows you to attract customers and differentiate your business. Deploying even a small wireless network has proven to be a...

User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
The 19th International Conference on User Modeling, Adaptation and Personalization (UMAP 2011) took place in Girona, Spain, during July 11–15, 2011. It was the third annual conference under the UMAP title, which resulted from the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive Hypermedia (AH)...
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition) (Self-Study Guide)

Foundation Learning for CCVP IP Telephony

Jeremy Cioara, CCIEВ® No. 11,727

Cisco IP Telephony (CIPT), Second Edition, is a CiscoВ®-authorized, self-paced learning tool for CCVP IP...

LAN Wiring
LAN Wiring
250+ detailed illustrations

The bestselling, state-of-the-art guide to cable installation for voice and data revised and updated to reflect the very latest advances and standards

Packed with essential time- and trouble-saving information, and written by a 25-year cabling veteran, LAN...

Ransomware: Defending Against Digital Extortion
Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the...

The 7 Irrefutable Rules of Small Business Growth
The 7 Irrefutable Rules of Small Business Growth
MASTER THE SECRETS OF SUSTAINED GROWTH

"Steve is a true storyteller, and it's his real-world stories that bring these rules to life. This book is both a great read and a practical guide to reaching the next level. Here's something else that is irrefutable...Steven Little is the business growth expert!"
—Lee Jones
...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy