Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ordering Disorder: Grid Principles for Web Design (Voices That Matter)
Ordering Disorder: Grid Principles for Web Design (Voices That Matter)

At some level, design can be seen as a method of using creativity to impose tyranny on the world. Not tyranny in its classical sense, but rather tyranny on a much more modest, much more personal scale.

In the progression from problem to idea to solution, the designer may describe what she does in commercial terms (business...

Contemporary Marketing
Contemporary Marketing

 

Products often begin their lives as something extraordinary, and as they grow they continue to
evolve. The most successful products in the marketplace are those that know their strengths and have
branded and marketed those strengths to form a passionate emotional connection with loyal...
Joint Source-Channel Coding of Discrete-Time Signals with Continuous Amplitudes (Communications and Signal Processing)
Joint Source-Channel Coding of Discrete-Time Signals with Continuous Amplitudes (Communications and Signal Processing)
This book provides the first comprehensive and easy-to-read discussion of joint source-channel encoding and decoding for source signals with continuous amplitudes. It is a state-of-the-art presentation of this exciting, thriving field of research, making pioneering contributions to the new concept of source-adaptive modulation. The book starts with...
In The Name Of Terrorism: Presidents On Political Violence In The Post-world War II Era
In The Name Of Terrorism: Presidents On Political Violence In The Post-world War II Era
No book like this could have been written without the generous assistance of the staffs of Lyndon B. Johnson Presidential Library, the Jimmy Carter Presidential Library, the Ronald Reagan Presidential Library, and the George Bush Presidential Library. Going far beyond providing normal access to internal documents, the staffs of these libraries...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Microsoft Outlook 2007 Programming: Jumpstart for Power Users and Administrators
Microsoft Outlook 2007 Programming: Jumpstart for Power Users and Administrators
Microsoft Outlook is the most widely used e-mail program and offers the most programmability. Sue Mosher introduces key concepts for programming Outlook using Visual Basic for Applications, custom Outlook forms, and external scripts, without the need for additional development tools.

For those who manage Outlook installations, it
...
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Wireless Networking Handbook
Wireless Networking Handbook
Many organizations utilize traditional wire-based networking technologies to establish connections among computers. These technologies fall into the following three categories:

• Local area networks (LANs)
• Metropolitan area networks (MANs)
• Wide area networks (WANs)

LANs support the sharing of
...
Pro Java 6 3D Game Development: Java 3D, JOGL, JInput and JOAL APIs (Expert's Voice in Java)
Pro Java 6 3D Game Development: Java 3D, JOGL, JInput and JOAL APIs (Expert's Voice in Java)
Create strange lands filled with mysterious objects (cows frozen in blocks of ice, chirping penguins, golden globes with wavering eyes) and throw away your keyboard and mouse, to go exploring armed only with a gamepad, power glove, or just your bare hands…

Java gaming expert Andrew Davison will show you how to develop...

Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Crimmins (2000) marveled at the greatness of the “three pound-blob” that is our brain and control system. As seasoned clinicians in the field of neuro-rehabilitation, we still marvel each day at the resilience of the brain and at the exciting recoveries that we attempt to facilitate in survivors of acquired brain...
A Course In Light-Speed Reading: A Return To Natural Intuitive Reading
A Course In Light-Speed Reading: A Return To Natural Intuitive Reading
Many years ago, I took a course in speed-reading as part of a college program. It was marvelous for me to break the 700 words per minute “barrier” and explode into a new world of reading. I found that, for me, reading was more of a block or hindrance than an aid to learning. I had to do something significantly different so that I...
C How to Program, Global Edition
C How to Program, Global Edition
Welcome to the C programming language and to C How to Program, Eighth Edition! This book presents leading-edge computing technologies for college students, instructors and software-development professionals.



...
unlimited object storage image
Result Page: 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy