Home | Amazing | Today | Tags | Publishers | Years | Search 
The Cultural Imperative: Global Trends in the 21st Century
The Cultural Imperative: Global Trends in the 21st Century

Will the tidal wave of globalization lead us to a bland and uniform cultural landscape dominated by a unified cultural perspective? Will cultural imperialism triumph in the twenty-first century? Or will the cultural imperative that drives human behavior through religion, language, geography and history maintain its influence on the human...

3ds Max 9 Bible
3ds Max 9 Bible

A favorite of 3ds Max artists from beginners to pros!

Why is 3ds Max Bible a perennial bestselling favorite? Because whether you're a beginner looking for a tutorial to get you up to speed on your first day or an expert needing a reference to Max's advanced features, it's all here. Loaded with advice, professional tips, and...

Applied Mathematics for Database Professionals (Expert's Voice)
Applied Mathematics for Database Professionals (Expert's Voice)
Relational databases hold data, right? They indeed do, but to think of a database as nothing more than a container for data is to miss out on the profound power that underlies relational technology. A far more powerful way of thinking lies in relational technology's foundation in the mathematical disciplines of logic and set theory.

Databases...

Software Measurement: Establish - Extract - Evaluate - Execute
Software Measurement: Establish - Extract - Evaluate - Execute
Our world and our society are shaped and increasingly governed by software. We might accept it or not, but it is happening at this point and will continue further on. It is difficult to imagine our world without software. There would be no running water, food supplies, business or transportation would disrupt immediately, diseases would spread, and...
Conceptual Modeling of Information Systems
Conceptual Modeling of Information Systems
When designing an information system, conceptual modeling is the activity that elicits and describes the general knowledge the system needs to know. This description, called the conceptual schema, is necessary in order to develop an information system. Recently, many researchers and professionals share a vision in which the conceptual schema...
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

LabVIEW based Advanced Instrumentation Systems
LabVIEW based Advanced Instrumentation Systems
Information is a valuable resource to an organization. User-friendly, computercontrolled instrumentation and data analysis techniques are revolutionizing the way measurements are being made, allowing nearly instantaneous comparison between theoretical predictions, simulations, and actual experimental results. This book provides comprehensive...
CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
Software Engineering 1: Abstraction and Modelling (Texts in Theoretical Computer Science. An EATCS Series)
Software Engineering 1: Abstraction and Modelling (Texts in Theoretical Computer Science. An EATCS Series)
From the reviews:

"The book under review is the first one from a series of three volumes that provides a compelling framework for a more comprehensive understanding of both formal and practical concerns of software engineering. The major feature distinguishing these textbooks from other current ones is the natural manner in which...

Inside SQLite
Inside SQLite

SQLite is a small, zero-configuration, custom-tailored, embeddable, threadsafe, easily maintainable, transactionoriented, SQL-based, relational database management system. There is no separate install or setup procedure to initialize SQLite before using it. There is no configuration file.

SQLite is open source, and...

Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings
Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings
This volume contains the papers presented at the Fourth International Conference on Fun with Algorithms (FUN 2007), held June 3–5, 2007 in the beautiful Tuscanian coastal town of Castiglioncello, Italy.

FUN is a three-yearly conference dedicated to the use, design, and analysis of algorithms and data structures, focusing on results
...
Result Page: 849 848 847 846 845 844 843 842 841 840 839 838 837 836 835 834 833 832 831 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy