Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bioanalytical Chemistry
Bioanalytical Chemistry
Bioanalytical chemistry is playing an increasingly central role in the fields of academic and industrial science. It overlaps with a diverse range of disciplines, including biotechnology, biopharmaceuticals, and diagnostics–all of which makes a comprehensive introduction to the subject even more essential for students and researchers.

...

XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies
XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud...

Arabic For Dummies (Language & Literature)
Arabic For Dummies (Language & Literature)

Your survival guide for everyday words and expressions

Your fun and friendly guide to Modern Standard Arabic

This unintimidating guide will help you start speaking Modern Standard Arabic — beginning today! Whether you're a student, a traveler, or you work in business...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Powerboater's Guide to Electrical Systems, Second Edition
Powerboater's Guide to Electrical Systems, Second Edition
Understand, troubleshoot, repair, and upgrade your boat’s electrical systems

Frustrated by the high cost of basic electrical work but nervous about tackling such projects yourself? Get sound advice and guidance from author Ed Sherman, who wrote and teaches the American Boat & Yacht Council’s...

Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computational Physics
Computational Physics
Computational physics book that emphasizes the physics that can be done with numerical/computational methods rather than just the methods themselves. Uses True Basic. (Representative programs on WWW). Praised for its coverage of many interesting topics in pure and applied physics.

From the Publisher
...
Delivering Utility Computing: Business-driven IT Optimization
Delivering Utility Computing: Business-driven IT Optimization
Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.

The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight.  By following the principles of utility computing, also known as on-demand computing, real-time...

A Beginner's Guide to Gambas: Programming
A Beginner's Guide to Gambas: Programming
A Beginner's Guide to Gambas is the first definitive reference for the Linux-based Gambas programming language. Gambas ships with a graphical development environment based on the Basic programming language. It supports object-oriented programming and is similar to Microsoft's Visual Basic product. Gambas uses the Qt toolkit and supports other...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Ship-shaped Offshore Installations: Design, Building, and Operation
Ship-shaped Offshore Installations: Design, Building, and Operation
Ship-shaped offshore units are some of the more economical systems for the development of offshore oil and gas, and are often preferred in marginal fields. These systems are especially attractive to develop oil and gas fields in deep and ultra-deep water areas and remote locations away from existing pipeline infrastructures. Recently, the...
Deterministic and Statistical Methods in Machine Learning: First International Workshop, Sheffield, UK, September 7-10, 2004. Revised Lectures
Deterministic and Statistical Methods in Machine Learning: First International Workshop, Sheffield, UK, September 7-10, 2004. Revised Lectures
Machine learning is a rapidly maturing field that aims to provide practical methods for data discovery, categorization and modelling. The Sheffield Machine Learning Workshop, which was held 7–10 September 2004, brought together some of the leading international researchers in the field for a series of talks and posters that represented new...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy