Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Orthopaedic Physical Exam
The Orthopaedic Physical Exam
"Excellent for anyone evaluating orthopaedic patients...A good reference for brushing up on the lesser-used tests that are needed on occasion in a clinical practice...A good addition to the libraries of practitioners who wish to sharpen their clinical diagnostic techniques."JOSPT

A must-have for anyone who performs
...
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Collaborate or Perish!: Reaching Across Boundaries in a Networked World
Collaborate or Perish!: Reaching Across Boundaries in a Networked World

In Collaborate or Perish! former Los Angeles police chief and New York police commissioner William Bratton and Harvard Kennedy School’s Zachary Tumin lay out a field-tested playbook for collaborating across the boundaries of our networked world. Today, when everyone is connected, collaboration is the game changer. Agencies and...

The iPod & iTunes Pocket Guide, Second Edition (2nd Edition)
The iPod & iTunes Pocket Guide, Second Edition (2nd Edition)
iPod users want to start using their devices as soon as they get their hands on them, and this guide shows them how. In these pages, trusted gadget teacher Christopher Breen reveals the secrets to using the leading portable player. This handy guide offers the quickest way to learn how to use the iTunes Store (including the new movie store!),...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

CCNA Fast Pass
CCNA Fast Pass
The Perfect CCNA Preparation and Review Tool

From the author of Sybex’s best-selling CCNA: Cisco Certified Network Associate Study Guide comes the streamlined tool you need to hone in on critical CCNA information: CCNA Fast Pass. The enclosed CD lets you practice, practice, practice so you can...

Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
AVVID (Architecture for Voice, Video, and Integrated Data) is a network architecture made up of hardware and software that transmits a company’s data such as e-mail, web traffic, file transfers, voice traffic, and video traffic over the same physical computer network. Imagine taking the three networks your...
Atmospheric Monitoring With Arduino: Building Simple Devices to Collect Data About the Environment
Atmospheric Monitoring With Arduino: Building Simple Devices to Collect Data About the Environment
We as a species are probably a little bit smarter than fish: at least we know that we spend our lives “swimming” at the bottom of an ocean of air. About 4/5th of that ocean is the relatively harmless gas nitrogen. Around another 1/5 of it is the highly reactive and slightly toxic gas oxygen. The...
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

Tork & Grunt's Guide to Great Presentations
Tork & Grunt's Guide to Great Presentations

Grunt, our favorite prehistoric caveman, has risen to become chief of the tribe, with an expectation that he will be a great leader of his people. However, like most people, Grunt hates the idea of public speaking. But with the guidance of his colleague, Tork, he quickly becomes a competent and convincing speaker and presenter. In this...

unlimited object storage image
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy