Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maya Secrets of the Pros
Maya Secrets of the Pros
Featuring completely original material from a new team of Maya know-it-alls, this second edition of an award-winning book is sure to inform and inspire even the most seasoned Maya user. In this distinctive Maya Press title, a cadre of professionals led by two acclaimed Maya pros, reveal the precious secrets they’ve...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Concurrent and Real-Time Programming in Ada
Concurrent and Real-Time Programming in Ada
Ada is the only ISO-standard, object-oriented, concurrent, real-time programming language. It is intended for use in large, long-lived applications where reliability and efficiency are essential, particularly real-time and embedded systems. In this book, Alan Burns and Andy Wellings give a thorough, self-contained account of how the Ada tasking...
Tabletops - Horizontal Interactive Displays (Human-Computer Interaction Series)
Tabletops - Horizontal Interactive Displays (Human-Computer Interaction Series)

This book is an attempt to bring together current research in the domain of interactive horizontal displays. The book integrates and summarises findings from the most important international tabletop research teams. It provides a state-of-the-art overview and allows for the discussion of emerging and future directions in research and...

All-Digital Frequency Synthesizer in Deep-Submicron CMOS
All-Digital Frequency Synthesizer in Deep-Submicron CMOS

Design flow and circuit techniques of contemporary transceivers for multigigahertz mobile radio-frequency (RF) wireless applications are typically quite analog intensive and utilize process technologies that are incompatible with a digital baseband (DBB) and application processor (AP). Nowadays, the DBB and AP designs constantly migrate to...

Building Microservices
Building Microservices

Distributed systems have become more fine-grained in the past 10 years, shifting from code-heavy monolithic applications to smaller, self-contained microservices. But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system...

Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

The Philosophy of Gottlob Frege
The Philosophy of Gottlob Frege
Begriffsschrift was, as the subtitle announced, a formula language of pure
thought modeled upon the language of arithmetic. Frege borrowed the notation
for functions from arithmetic, and enlarged the realm of applicability
of a function beyond the domain of numbers. Then, supplanting the
subject/predicate division, which was
...
Global IT Management: A Practical Approach
Global IT Management: A Practical Approach
Global IT Management presents a practical approach for initiating and reinforcing global IT, focusing on the mechanisms that need to be put in place to effectively manage IT architecture, strategy, standards, and control across sites in a multinational firm. Key considerations are explained for each domain together with concrete...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
JavaScript Cookbook (Oreilly Cookbooks)
JavaScript Cookbook (Oreilly Cookbooks)

Why reinvent the wheel every time you run into a problem with JavaScript? This cookbook is chock-full of code recipes that address common programming tasks, as well as techniques for building web apps that work in any browser. Just copy and paste the code samples into your project -- you’ll get the job done faster and learn...

unlimited object storage image
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy