Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to How Computers Do Math : Featuring the Virtual DIY Calculator
The Definitive Guide to How Computers Do Math : Featuring the Virtual DIY Calculator
The Basics of Computer Arithmetic Made Enjoyable and Accessible—with a Special Program Included for Hands-on Learning

"The combination of this book and its associated virtual computer is fantastic! Experience over the last fifty years has shown me that there's only one way to truly understand how computers work; and that is to learn...

Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
This book is a crystallization of the authors' work over the last twenty-five years. The book covers the latest advances in grey information and systems research, providing a state-of-the-art overview of this important field. Covering the theoretical foundation, fundamental methods and main topics in grey information and systems research, this book...
The Art of Multiprocessor Programming
The Art of Multiprocessor Programming
The first text and reference on this sea change in the computer industry

This book is the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. It is of immediate use to programmers working with the new architectures. For example, the next generation of computer game
...
Programming the Cell Broadband Engine Architecture: Examples and Best Practices
Programming the Cell Broadband Engine Architecture: Examples and Best Practices

In this IBM® Redbooks® publication, we provide an introduction to the Cell Broadband Engine™ (Cell/B.E.™ ) platform. We show detailed samples from real-world application development projects and provide tips and best practices for programming Cell/B.E. applications.

We also describe...

Expert SQL Server 2008 Encryption
Expert SQL Server 2008 Encryption

Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL...

Professional jQuery (Wrox Programmer to Programmer)
Professional jQuery (Wrox Programmer to Programmer)
OVER THE PAST SEVERAL YEARS JAVASCRIPT has undergone a remarkable transformation. Where once it was a “toy” language relegated to secondary status it’s now one of the most important programming languages in the world. With the ongoing importance of Ajax-based development and the rise of full-featured JavaScript...
A Guide to the Business Analysis Body of Knowledge(r) (Babok(r) Guide)
A Guide to the Business Analysis Body of Knowledge(r) (Babok(r) Guide)

Business analysis is the set of tasks and techniques used to work as a liaison among stakeholders in order to understand the structure, policies, and operations of an organization, and to recommend solutions that enable the organization to achieve its goals. Business analysis involves understanding how organizations function to accomplish...

Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs
Social Networking for Business: Choosing the Right Tools and Resources to Fit Your Needs

The First Best-Practice Guide to Executing Any Type of Social Computing Project

 

Organizations today aren’t just participating in social networking, collaborative computing, and online communities--they are depending on those communities to...

Diseases and Disorders: A Nursing Therapeutics Manual
Diseases and Disorders: A Nursing Therapeutics Manual

Everything your students need to know about caring for patients is in this one portable reference! Now in its third edition, Diseases and Disorders: A Nursing Therapeutics Manual, containing complete information on hundreds of disorders, is still a "must have" reference for every nurse. In a concise format, this handbook allows...

Learning Analytics in R with SNA, LSA, and MPIA
Learning Analytics in R with SNA, LSA, and MPIA

This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.    

...

From Photon to Pixel: The Digital Camera Handbook (Digital Signal and Image Processing)
From Photon to Pixel: The Digital Camera Handbook (Digital Signal and Image Processing)

This second edition of the fully revised and updated From Photon to Pixel presents essential elements in modern digital photographic devices. Our universal infatuation with photography profoundly affects its usage and development.
While some sides of photographic “culture” remain wholly unchanged – art photography,
...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
unlimited object storage image
Result Page: 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy