Home | Amazing | Today | Tags | Publishers | Years | Search 
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing
Global Software and IT: A Guide to Distributed Development, Projects, and Outsourcing

Ongoing economic challenges are affecting and impacting business and society in nearly every industry and geographical region. Taking decisive action to reprioritize the way we are doing business is a key focus for companies. Around the world, companies are taking the necessary measures that will enable us to adjust to today’s reality...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

SQL and Relational Theory: How to Write Accurate SQL Code
SQL and Relational Theory: How to Write Accurate SQL Code

This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course— using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things, experience gained from teaching live seminars based on the first edition.

One...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Microsoft Outlook 2010: Complete (Shelly Cashman)
Microsoft Outlook 2010: Complete (Shelly Cashman)

The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud that since Mircosoft Offi ce 4.3, our series of Microsoft Offi ce textbooks have been the most widely used books in education. With each new edition of our Offi ce books, we make signifi cant improvements based on the software and comments...

Scrum in Action
Scrum in Action
While there are some good books on Scrum out there, we believe none of them deal with all the essentials a software project team needs to know in order to begin and complete a Scrum software project within corporate constraints (by corporate constraints, we mean in companies where Scrum or Agile has not been successfully...
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Fundamentals of Quantum Chemistry: Molecular Spectroscopy and Modern Electronic Structure Computations
Fundamentals of Quantum Chemistry: Molecular Spectroscopy and Modern Electronic Structure Computations

As quantum theory enters its second century, it is fitting to examine just how far it has come as a tool for the chemist. Beginning with Max Planck’s agonizing conclusion in 1900 that linked energy emission in discreet bundles to the resultant black-body radiation curve, a body of knowledge has developed with profound consequences in...

Islamic Leviathan: Islam and the Making of State Power (Religion and Global Politics)
Islamic Leviathan: Islam and the Making of State Power (Religion and Global Politics)
Over the course of the past two decades Islamism has exercised a growing influence on politics in Muslim countries from Morocco to Malaysia. In some instances this trend has led to regime change as in Iran and Sudan, but more often, it has ensconced Islamic norms, symbols, and rhetoric in the public sphere, and in the process,...
Computer Performance Engineering: 6th European Performance Engineering Workshop, EPEW 2009 London
Computer Performance Engineering: 6th European Performance Engineering Workshop, EPEW 2009 London
This volume of LNCS contains the proceedings of the 6th European Performance Engineering Workshop, held at Imperial College London during July 9–10, 2009. This was the first in the EPEW series to be held in the UK, following on from the highly successful workshops that were held in Toledo (2004), Versailles (2005),...
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps Beginner's Guide is probably the first book from any technical publisher that teaches you to build real world applications (five of them). That's a bold step from PacktPub - by undertaking more lively practical examples, rather than 400 pages of text! The book lays emphasis on location services, due to the...
Onboard Computers, Onboard Software and Satellite Operations: An Introduction (Springer Aerospace Technology)
Onboard Computers, Onboard Software and Satellite Operations: An Introduction (Springer Aerospace Technology)

The development of satellites is always driven by their applications, so the payload and its satellite infrastructure can fulfill all envisioned tasks and sometimes this is under great autonomy. The brain of the satellite is the Onboard Computer with the Onboard Software providing functions, procedures and services in preparation for the...

Result Page: 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy