Home | Amazing | Today | Tags | Publishers | Years | Search 
Introducing Reason 4
Introducing Reason 4
Welcome to Introducing Reason 4. Whether you already have experience with digital music creation or are completely new to it, you are probably aware that the possibilities available today for creating music in the digital environment are truly staggering. Over the last decade as computers have gotten faster and available storage space has...
Nonlinear Digital Filters: Analysis and Applications
Nonlinear Digital Filters: Analysis and Applications
This book provides an easy to understand overview of nonlinear behavior in digital filters, showing how it can be utilized or avoided when operating nonlinear digital filters. It gives techniques for analyzing discrete-time systems with discontinuous linearity, enabling the analysis of other nonlinear discrete-time systems, such as sigma delta...
Footprints Of The Jesuits
Footprints Of The Jesuits
This scarce antiquarian book is included in our special Legacy Reprint Series. In the interest of creating a more extensive selection of rare historical book reprints, we have chosen to reproduce this title even though it may possibly have occasional imperfections such as missing and blurred pages, missing text, poor pictures, markings, dark...
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Auralization: Fundamentals of Acoustics, Modelling, Simulation, Algorithms and Acoustic Virtual Reality (RWTHedition)
Auralization: Fundamentals of Acoustics, Modelling, Simulation, Algorithms and Acoustic Virtual Reality (RWTHedition)
From the reviews:

"Particularly attractive about this book is its very complete coverage of auralization techniques, presenting applications not only in room acoustics but also in sound insulation and in other noise control engineering applications, as well as in real-time virtual reality. … The book serves as an excellent overview...

Recording Tips for Engineers, Second Edition: For cleaner, brighter tracks
Recording Tips for Engineers, Second Edition: For cleaner, brighter tracks
"Crammed with everything you need, and I mean everything. Simple explanations with brilliant illustrations, every conceivable studio tip and trick, a few 'rock star' anecdotes and, as usual, Tim's humor is great." Bob Schwall, Battery Studios

Over a thousand easy-to-use tips, hints, tricks, how-tos, setups,
...
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004.

The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from...

Network Security: A Practical Guide (Computer Weekly Professional)
Network Security: A Practical Guide (Computer Weekly Professional)
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from
both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those
...
Microsoft Outlook Programming, Jumpstart for Administrators, Developers, and Power Users
Microsoft Outlook Programming, Jumpstart for Administrators, Developers, and Power Users
Microsoft Outlook Programming unleashes the power of Microsoft Outlook, allowing administrators and end users to customize Outlook in the same way that they've used macros and templates to customize other programs like Excel and Word. Experienced developers will find the quick-start information they need to begin integrating Outlook into their...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Photoshop for Right-Brainers: The Art of Photo Manipulation
Photoshop for Right-Brainers: The Art of Photo Manipulation
Attention Right-Brainers!

You're an artistic visionary, right? In your head you imagine clever image fixes, fanciful photo manipulations, and artworks of startling genius. But when it comes to bringing these visions to life on your computer -- well, that’s the hard part. If this sounds
...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Result Page: 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 278 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy