Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Keywords in Radical Philosophy and Education (Critical Understanding in Education)
Keywords in Radical Philosophy and Education (Critical Understanding in Education)
While education is an inherently political field and practice, and while the political struggles that radical philosophy takes up necessarily involve education, there remains much to be done at the intersection of education and radical philosophy. That so many intense political struggles today actually center educational processes and...
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

The Nile Development Game: Tug-of-War or Benefits for All?
The Nile Development Game: Tug-of-War or Benefits for All?

This book introduces an analytic framework constructed upon the iterated Prisoners' Dilemma game to model and analyze transboundary water interactions along the Nile River. It presents a thorough and in-depth analysis of the historical path through which conflict and cooperation have been generated among the Nile riparians over...

Learn WebAssembly: Build web applications with native performance using Wasm and C/C++
Learn WebAssembly: Build web applications with native performance using Wasm and C/C++

The first definitive guide on WebAssembly to help you break through the barriers of web development and build an entirely new class of performant applications

Key Features

  • Generate WebAssembly modules from C and C++ using Emscripten and interact with these modules in the browser
  • ...
Microsoft OneNote Step by Step
Microsoft OneNote Step by Step

The quick way to learn Microsoft OneNote!

This is learning made easy. Get productive fast with OneNote and jump in wherever you need answers. Brisk lessons and colorful screenshots show you exactly what to do, step by step--and practice files help you build your skills.

  • Access local and online...
Artificial Cognition Systems
Artificial Cognition Systems
The central questions confronting artificial intelligence and cognitive science revolve around the nature of meaning and of mind. Minds are presumed to be the processors of mental content, where that content has the capacity to influence our speech and other behavior. The hard part is figuring out how that is done. Mental states must exercise...
Computer Vision with OpenCV 3 and Qt5: Build visually appealing, multithreaded, cross-platform computer vision applications
Computer Vision with OpenCV 3 and Qt5: Build visually appealing, multithreaded, cross-platform computer vision applications

Blend the power of Qt with OpenCV to build cross-platform computer vision applications

Key Features

  • Start creating robust applications with the power of OpenCV and Qt combined
  • Learn from scratch how to develop cross-platform computer vision applications
  • ...
Data Analysis and Graphics Using R: An Example-Based Approach
Data Analysis and Graphics Using R: An Example-Based Approach

Discover what you can do with R! Introducing the R system, covering standard regression methods, then tackling more advanced topics, this book guides users through the practical, powerful tools that the R system provides. The emphasis is on hands-on analysis, graphical display, and interpretation of data. The many worked examples, from...

Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework

Imagine the boost in business if you can build large, rich web applications with little code and built-in Windows authentication. With this book, you can gain skills to develop real-world applications with ASP.NET Core 2.

Key Features

  • Adopts the application-centric approach to explain core...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Result Page: 141 140 139 138 137 136 135 134 133 132 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy