Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age
Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age
Circuits from silk? Today's technophiles probably have no idea how much today's computer technology owes to the invention of one ingenuous textile manufacturer in nineteenth-century France. Here, master storyteller James Essinger shows through a series of remarkable and meticulously researched historical connections how the Jacquard loom...
High Impact Data Visualization with Power View, Power Map, and Power BI
High Impact Data Visualization with Power View, Power Map, and Power BI

High Impact Data Visualization with Power View, Power Map, and Power BI helps you take business intelligence delivery to a new level that is interactive, engaging, even fun, all while driving commercial success through sound decision-making. Learn to harness the power of Microsoft’s flagship, self-service business intelligence...

Underlord (Cradle)
Underlord (Cradle)
A tournament approaches. All around the world, great clans and sects prepare their disciples to fight against one another in a competition of young Underlords.Even the Blackflame Empire is drawn in, but their youth are not strong enough to compete.Yet....
iPhone Games Projects
iPhone Games Projects
One look at the App Store will show you just how hot iPhone games have become. Games make up over 25 percent of all apps, and over 70 percent of the apps in the App Store's Most Popular category. Surprised? Of course not! We've all filled our iPhones with games, and many of us hope to develop the next best seller.

This book is a...

Fedora 9 and Red Hat Enterprise Linux Bible
Fedora 9 and Red Hat Enterprise Linux Bible
Master the latest version of Fedora and Red Hat Enterprise Linux with the step-by-step instructions and hands-on advice in Fedora 9 and Red Hat Enterprise Linux Bible. Learn key system administration skills like setting users and automating system tasks, understand the latest security issues and threats, and gain confidence with using and...
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

JUNOS Enterprise Switching
JUNOS Enterprise Switching
Charles Darwin once said, “I have called this principle, by which each slight variation, if useful, is preserved, by the term of Natural Selection.” This principle of evolution applies to business as well as to nature. Individuals, companies, and industries evolve and compete with one another in preparation for the future.
...
Marketing IT Products and Services
Marketing IT Products and Services

Characterized by lightning quick innovation, abrupt shifts in technology, and shorter lifecycles, the marketing of IT products and services presents a unique set of challenges and often requires IT managers and developers to get involved in the marketing process. Marketing IT Products and Services is written to help busy IT...

Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
Java Programming: From The Ground Up
Java Programming: From The Ground Up

Java Programming: From the Ground Up begins with the fundamentals of programming, moves through the object-oriented paradigm, and concludes with an introduction to graphics and event-driven programming. The broad coverage of topics as well as the modularity of the text makes the book suitable for both introductory and intermediatelevel...

Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

Symbian OS C++ for Mobile Phones (Symbian Press)
Symbian OS C++ for Mobile Phones (Symbian Press)
Richard Harrison’s existing books are the bestsellers in the Symbian Press Portfolio.В  His latest book, co-written with Mark Shackman is the successor to "Symbian OS C++ for Mobile Phones" Volumes One and Two. Written in the same style as the two previous volumes, this is set to be another gem in the series.В 

...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy