Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Refurbishment and Upgrading of Buildings: .
Refurbishment and Upgrading of Buildings: .
...I can recommend the book as good reading for students of surveying and architecture, for developers and for those involve with refurbishment of historic buildings..
–Dr. Jagjit Singh, Director, Environmental Building Solutions Ltd, Journal of Architectural Conservation No. 3, November 2001

...the
...
The Customer Rules
The Customer Rules
At a recent family gathering in my home, the grown-ups were trading stories about companies that provide good customer service and those that don't. Out of curiosity, I asked my then twelve-year-old granddaughter, Margot, what she thought were the most important rules for great service. Without a moment's hesitation, she...
After Effects On the Spot: Time-Saving Tips and Shortcuts from the Pros
After Effects On the Spot: Time-Saving Tips and Shortcuts from the Pros

Motion graphics artists of all experience levels will find the solutions they need in an accessible format to build better compositions, animate with audio, dazzle clients with Visual FX, and much much more.


Packed with more than 400 techniques, this book delivers what you need to know—on the spot.
...
iMovie 3 Fast & Easy
iMovie 3 Fast & Easy
So, you wanna be in pictures? Home-movie Hitchcock wannabes have a simple and exciting desktop video-editing tool: Apple’s iMovie 3. iMovie 3 is the perfect tool for turning those long, boring home videos into interesting, polished productions that your family and friends will enjoy. Let’s face it, without video-editing software to...
19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

IBM Xseries 455 Planning And Installation Guide
IBM Xseries 455 Planning And Installation Guide
The IBM eServer xSeries 455 is the second-generation Enterprise X-Architecture server using the 64-bit IBM XA-64 chipset and the Intel Itanium 2 processor. Unlike the x450, its predecessor, the x455 supports the merging of four server chassis to form a single 16-way image, providing even greater expandability and investment protection.
...
Handbook on Advancements in Smart Antenna Technologies for Wireless Networks (Premier Reference Source)
Handbook on Advancements in Smart Antenna Technologies for Wireless Networks (Premier Reference Source)
The dramatic growth of the wireless communication industry has resulted in searches for new technologies to provide broader bandwidth per user channel, better quality, and new value-added services. Employing smart antennas presents an elegant and relatively economical way to improve the performance of wireless transmission.

The Handbook...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
We are delighted lo present the ECDL 2004 Conference proceedings from the 8th European Conference on Research and Advanced Technology for Digital Li- braries at the University of Bath. Bath, UK. This followed an impressive and geographically dispersed series of locations for previous events: Pisa (1997). ller- aklion (1998),...
Building Service Provider Networks
Building Service Provider Networks
Learn how to gain the edge of providing the most reliable service-level guarantees to customers

Network and service provider engineers are often faced with the difficult challenge of meeting a less-than-logical service need of a customer–– and at the most reasonable price. In this book, Howard Berkowitz shows network and service...

Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Yahoo! Web Analytics: Tracking, Reporting, and Analyzing for Data-Driven Insights
Yahoo! Web Analytics: Tracking, Reporting, and Analyzing for Data-Driven Insights
Yahoo! Web Analytics teaches readers how to collect data, report on that data, and derive useful insights using Yahoo!’s free Web analytics tool . This detailed resource from Yahoo!’s Director of Data Insights discusses the why of Web analytics as well as the how while revealing secrets and tricks not documented elsewhere. The...
unlimited object storage image
Result Page: 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy