Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HTML & XHTML: The Definitive Guide (6th Edition)
HTML & XHTML: The Definitive Guide (6th Edition)

Put everthing you need to know about HTML & XHTML at your fingertips. For nearly a decade, hundreds of thousands of web developers have turned to HTML & XHTML: The Definitive Guide to master standards-based web development. Truly a definitive guide, the book combines a unique balance of...

Learning Maya 6 Rendering
Learning Maya 6 Rendering
Learning Maya 6: Rendering is your resource for creating dazzling imagery in Maya. Get hands-on experience with the power of the Maya rendering engine and mental ray for Maya as you set lights and cameras to your scenes, apply materials and textures to your models, create shading networks, and much more! Whether you are striving for...
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition

Here's the book you need to prepare for Cisco's CCIE Qualification and Lab Exams. This Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of all exam objectives
  • Hundreds of challenging practice questions, in...
Control of Redundant Robot Manipulators: Theory and Experiments (Lecture Notes in Control and Information Sciences)
Control of Redundant Robot Manipulators: Theory and Experiments (Lecture Notes in Control and Information Sciences)
From the reviews of the first edition:

"The monograph is concerned with the position and force control of redundant robot manipulators from both theoretical and experimental points of view. It contains a rich bibliography as well as a full symbol and subject index. Its aim is to provide an introduction for graduate students and researchers...

SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Mac OS X Lion: Peachpit Learning Series
Mac OS X Lion: Peachpit Learning Series

The latest update of Robin Williams bestselling guide will have you working miracles in no time with Mac OS X Lion. With this book, you can learn in your own way, whether it's working through the lessons from start to finish, jumping straight to step-by-step exercises about new features, or looking up just what you need to know at that...

Test Equating, Scaling, and Linking: Methods and Practices
Test Equating, Scaling, and Linking: Methods and Practices

This book provides an introduction to test equating, scaling and linking, including those concepts and practical issues that are critical for developers and all other testing professionals. In addition to statistical procedures, successful equating, scaling and linking involves many aspects of testing, including procedures to develop tests,...

Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)
Tensor Product Model Transformation in Polytopic Model-Based Control (Automation and Control Engineering)

Tensor Product Model Transformation in Polytopic Model-Based Control offers a new perspective of control system design. Instead of relying solely on the formulation of more effective LMIs, which is the widely adopted approach in existing LMI-related studies, this cutting-edge book calls for a systematic modification and...

Managing Your Outsourced IT Services Provider: How to Unleash the Full Potential of Your Global Workforce
Managing Your Outsourced IT Services Provider: How to Unleash the Full Potential of Your Global Workforce

Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decades of experience managing client relationships for global IT services companies,...

Learn Computer Science with Swift: Computation Concepts, Programming Paradigms, Data Management, and Modern Component Architectures with Swift and Playgrounds
Learn Computer Science with Swift: Computation Concepts, Programming Paradigms, Data Management, and Modern Component Architectures with Swift and Playgrounds

Master the basics of solving logic puzzles, and creating algorithms using Swift on Apple platforms. This book is based on the curriculum currently being used in common computer classes. You’ll learn to automate algorithmic processes that scale using Swift in the context of iOS, macOS, tvOS, and watchOS.

Begin by...

Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.

Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects
...
Result Page: 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 314 313 312 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy