Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Construction Waterproofing Handbook
Construction Waterproofing Handbook
The Latest Waterproofing Techniques and Technology

Fully updated to include new techniques for mold remediation, Construction Waterproofing Handbook simplifies the critical task of keeping a building's envelope watertight. It begins with a tutorial on basic waterproofing concepts and materials, then moves on to the...

Software Requirement Patterns (Best Practices)
Software Requirement Patterns (Best Practices)
Learn proven, real-world techniques for specifying software requirements with this practical reference. It details 30 requirement "patterns" offering realistic examples for situation-specific guidance for building effective software requirements. Each pattern explains what a requirement needs to convey, offers potential questions to...
Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Subversion Version Control: Using the Subversion Version Control System in Development Projects (Bruce Perens Open Source)
Subversion Version Control: Using the Subversion Version Control System in Development Projects (Bruce Perens Open Source)

In any software development project, many developers contribute changes over a period of time. Using a version control system to track and manage these changes is vital to the continued success of the project. This book introduces you to Subversion, a free, open-source version control system, which is both more powerful and much less complex...

Text-to-Speech Synthesis
Text-to-Speech Synthesis

Text-to-Speech Synthesis provides a complete, end-to-end account of the process of generating speech by computer. Giving an in-depth explanation of all aspects of current speech synthesis technology, it assumes no specialized prior knowledge. Introductory chapters on linguistics, phonetics, signal processing and speech signals lay the...

Mechanical Engineering Systems (IIE Core Textbooks Series)
Mechanical Engineering Systems (IIE Core Textbooks Series)
The authors of Mechanical Engineering Systems have taken a highly practical approach within this book, bringing the subject to life through a lively text supported by numerous activities and case studies. Little prior knowledge of mathematics is assumed and so key numerical and statistical techniques are introduced through unique Maths in Action...
The Myths of Innovation
The Myths of Innovation
How do you know whether a hot technology will succeed or fail? Or where the next big idea will come from? The best answers come not from the popular myths we tell about innovation, but instead from time-tested truths that explain how we've made it this far. This book shows the way.

In The Myths of Innovation, bestselling
...
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Programming Microsoft LINQ in Microsoft .NET Framework 4
Programming Microsoft LINQ in Microsoft .NET Framework 4

We saw Language Integrated Query (LINQ) for the first time in September 2005, when the LINQ Project was announced during the Professional Developers Conference (PDC 2005). We immediately realized the importance and the implications of LINQ for the long term. At the same time, we felt it would be a huge error to look to LINQ only for its...

Deploying Wireless Networks
Deploying Wireless Networks
deployment cycle in cellular and broadband wireless networks, including OFDM-WiMAX/LTE

Wireless operators will find this practical, hands-on guide to network deployment invaluable. Based on their own extensive experience, the authors describe an end-to-end network planning process to deliver the guaranteed Quality of Service
...
Result Page: 60 59 58 57 56 55 54 53 52 51 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy