Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Unified Modeling Language User Guide Second Edition
The Unified Modeling Language User Guide Second Edition
For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent...
Digital Image Processing (2nd Edition)
Digital Image Processing (2nd Edition)
Interest in digital image processing methods stems from two principal application
areas: improvement of pictorial information for human interpretation; and
processing of image data for storage, transmission, and representation for autonomous
machine perception.This chapter has several objectives: (1) to define
the scope of the
...
Strategies for eCommerce Success
Strategies for eCommerce Success
With electronic commerce growing so rapidly, businesses need to examine critical elements that could influence users' perceptions of business-to-business and business-to-consumer electronic commerce. This book presents a study of key components and concepts of e-commerce, evaluates the critical success factors for global e-commerce, the economics...
Beginning C# 2008: From Novice to Professional, Second Edition
Beginning C# 2008: From Novice to Professional, Second Edition
This book is for anyone who wants to write good C# code—even if you have never programmed before. Writing good code can be a challenge—there are so many options, especially in a .NET language like C#. If you want to really get the best from a programming language, you need to know which features work best in which situations and...
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Food Carbohydrate Chemistry
Food Carbohydrate Chemistry
Carbohydrates are major components of foods, accounting for more than 90% of the dry matter of fruits and vegetables and providing for 70-80% of human caloric intake worldwide (BeMiller and Huber 2008). Thus, from a quantitative perspective alone, carbohydrates warrant the attention of food chemists. From the standpoint of food...
Industrial Problem Solving Simplified: An 8-Step Program
Industrial Problem Solving Simplified: An 8-Step Program

Industrial Problem Solving Simplified provides a roadmap for solving manufacturing problems. Containing numerous examples of actual problems and their solutions in various industrial environments, it is for novice as well as experienced manufacturing owners, managers, quality representatives, consultants, trainers, and procurement...

Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)
Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)

Presents a detailed study of the major design components that constitute a top-down decision-tree induction algorithm, including aspects such as split criteria, stopping criteria, pruning and the approaches for dealing with missing values. Whereas the strategy still employed nowadays is to use a 'generic' decision-tree induction...

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Bring your electronic inventions to life!

"This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com

Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with...

Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Pro Visual Studio 2005 Team System
Pro Visual Studio 2005 Team System
Software development is undergoing a huge revolution right now. That is not to say that this
is different from any other time in the history of software development—it is always undergoing
a revolution of one type or another. This “new” revolution is a shift in development
methodologies from teams working in tightly
...
Crime and Punishment: Essential Primary Sources
Crime and Punishment: Essential Primary Sources
Crime, and the issues that relate to it, arouse compelling curiosity and fervent debate. In the human psyche, crimes and their underlying motives often capture equal measures of fascination and revulsion. In the media, criminals are both condemned and granted celebrity. Accordingly, the readings and resources offered in Crime and Punishment:...
unlimited object storage image
Result Page: 232 231 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy