Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WILEY IAS 2003: Interpretation and Application of International Accounting Standards
WILEY IAS 2003: Interpretation and Application of International Accounting Standards
This compact and truly comprehensive quick-reference presents accountants with a guide to depend on for assistance in the preparation and understanding of financial statements presented in accordance with IAS.

International Accounting Standards (IAS—with future pronouncements to be known as International Financial Reporting...

Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is...

Dialogue Editing for Motion Pictures: A Guide to the Invisible Art
Dialogue Editing for Motion Pictures: A Guide to the Invisible Art
Dialogue editing is a crucial yet invisible part of filmmaking. Do it right, and no one notices. Do it wrong, and your film or video sounds messy, distracting, and unrealistic. This is a book for people who need to edit production sound for film, TV, or video but were never taught how to do it. It goes step by step through the process and covers...
The Cryptoclub: Using Mathematics to Make and Break Secret Codes
The Cryptoclub: Using Mathematics to Make and Break Secret Codes
Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math topics covered...
Java Data Mining: Strategy, Standard, and Practice: A Practical Guide for architecture, design, and implementation
Drupal 6 JavaScript and jQuery
Drupal 6 JavaScript and jQuery

JavaScript: It's not just for calculators and image rollovers.

Drupal 6 is loaded with new features, and not all of them are necessarily implemented in PHP. This unique book, for web designers and developers, will take you through what can be done with JavaScript (and especially with jQuery) in Drupal 6.

With the combination of...

How to Be a People Magnet : Finding Friends--and Lovers--and Keeping Them for Life
How to Be a People Magnet : Finding Friends--and Lovers--and Keeping Them for Life
Some folks are human magnets. People smile at them wherever they go. They have faithful friends who would do anything for them. They get invited to all the parties. They have more dates than they can handle. What's their secret? According to bestselling author Leil Lowndes, beloved and popular people know the secret of fearless communicating . . ....
Pro Tools LE 7 Ignite! (Pro Tools Le 7 Ignite!: The Visual Guide for New Users)
Pro Tools LE 7 Ignite! (Pro Tools Le 7 Ignite!: The Visual Guide for New Users)
Get ready to explore the world of computer music creation with Pro Tools® LE 7! Even if you’ve never created music on your computer, Pro Tools LE 7 Ignite!, Second Edition will give you the skills you need to record and mix with confidence. Completely updated to cover the new features of Pro Tools LE 7.3 and 7.4, the book presents...
Hidden Nature: The Startling Insights of Viktor Schauberger
Hidden Nature: The Startling Insights of Viktor Schauberger
Viktor Schauberger, 1885-1958, was a radical pioneer of the study of the subtle energies in nature and the importance of living water in all natural processes. From unusually detailed observations of the natural world, he pioneered a completely new understanding of how nature works. He foresaw, and tried to warn against global waste and costly...
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
Careers for Class Clowns & Other Engaging Types, Second edition (Careers for You Series)
Careers for Class Clowns & Other Engaging Types, Second edition (Careers for You Series)
Careers for Class Clowns & Other Engaging Types

People have been getting paid to clown around for centuries. What’s stopping you? The medieval court jester has been replaced by the stand-up comedian, but there are many other career avenues for those with a unique sense of humor. You can turn your talent for making...

Computational Geometry: An Introduction Through Randomized Algorithms
Computational Geometry: An Introduction Through Randomized Algorithms

This introduction to computational geometry is designed for beginners. It emphasizes simple randomized methods, developing basic principles with the help of planar applications, beginning with deterministic algorithms and shifting to randomized algorithms as the problems become more complex. It also explores higher dimensional advanced...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy