|
|
|
|
Software Development HandbookThis Second Edition of the Software Development Handbook has been extensively revised and updated to incorporate new developments, and to improve and clarify the presentation.
This handbook is not intended as a complete course in software development for microcomputers. However, witb appropriate additional material and combined with... | | | | Getting Started with SAS Activity-Based Management 6.4, Second EditionThis document introduces basic modeling concepts that are used in SAS Activity-Based Management software. To complete the model-building process, move through this tutorial from beginning to end, exactly as it is presented. This tutorial also provides information that helps you become familiar with the SAS Activity-Based Management software: the... |
|
|
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his
chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made
furniture late in life that was in superficial respects the same as that which he made earlier,
but one can see his craft advance.
... | | Designing Mobile Service Systems (Research in Design Series)This book is the second in the Research in Design series. Design is an effort that enjoys a growing attention in the academic world. At Delft University of Technology design is a recognized part of science. Like other technical universities, Delft is rooted in the engineering field. And in spite of questions like ‘what is design’,... | | ESD : RF Technology and CircuitsThe phenomenon of electrostatic discharge (ESD) has been known for a long time, but recently a growing interest has been observed in ESD in radio frequency (RF) technology and ESD issues in RF applications.
Why now?
Early telecommunications started with William Cooke and Charles Wheatstone in the development of the electric... |
|
|
|
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |