Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Hardware and Computer Organization (Embedded Technology)
Hardware and Computer Organization (Embedded Technology)
Today, we often take for granted the impressive array of computing machinery that surrounds us
and helps us manage our daily lives. Because you are studying computer architecture and digital
hardware, you no doubt have a good understanding of these machines, and you’ve probably written
countless programs on your PCs and
...
Gas Explosion Technology and Biomass Refinery
Gas Explosion Technology and Biomass Refinery

The book introduces gas explosion technology (GET) and its applications in biomass refineries. In this book an overview of GET is provided, the mechanisms are thoroughly discussed. The chapters also cover the latest processes and equipments of GET, including equipment selection, parameter determination and engineering scaling-up. Last but not...

Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
Embodied Conceptualization or Neural Realization: A Corpus-Driven Study of Mandarin Synaesthetic Adjectives (Frontiers in Chinese Linguistics)
This book focuses on linguistic synaesthesia in a hitherto less-studied language – Mandarin Chinese – and adopts a corpus-driven approach to support the analysis and argumentation. The study identifies directional tendencies and underlying mechanisms for Mandarin synaesthetic adjectives. By doing so, it not only provides an...
Data Architecture: From Zen to Reality
Data Architecture: From Zen to Reality

First, note that I have used Zen in the title of this book. I have been asked many times why I used such an esoteric term. After all, what is the meaning of Zen? To clarify the meaning of Zen, we must examine the philosophical environment that gave rise to Zen: Indian and Chinese philosophies. In India, Buddhism arose out of a Hindu...

Sams Teach Yourself HTML and CSS in 24 Hours (Includes New HTML 5 Coverage) (8th Edition)
Sams Teach Yourself HTML and CSS in 24 Hours (Includes New HTML 5 Coverage) (8th Edition)

In 2009, it is estimated that more than 1.5 billion people have access to the Internet, including 220 million in the U.S. alone. Throw in 338 million Chinese users, 55 million German users, 48 million British users, 38 million Russian users, and 67 million Brazilians, and you can see the meaning of the word “world” in the...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference
Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference

As future generation information technology (FGIT) becomes specialized and fragmented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the...

Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy