Home | Amazing | Today | Tags | Publishers | Years | Search 
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)

Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a concise and direct manner, and...

CCNA Wireless Official Exam Certification Guide  (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721)
CCNA Wireless Official Exam Certification Guide
  • Master IUWNE 640-721 exam topics with the official study guide
  • Assess your knowledge with chapter-opening quizzes
  • Review key concepts with Exam Preparation Tasks
  • Practice with realistic exam questions on the CD-ROM
...
Mechanical Engineers Data Handbook
Mechanical Engineers Data Handbook
There are several good mechanical engineering data books on the market but these tend to be very bulky and expensive, and are usually only available in libraries as reference books.

The Mechnical Engineer’s Data Handbook has been compiled with the express intention of providing a compact but comprehensive source of information of
...
Intelligent Scene Modelling Information Systems (Studies in Computational Intelligence)
Intelligent Scene Modelling Information Systems (Studies in Computational Intelligence)
Scene modeling is a very important part in Computer Graphics because it all ows creating more or less complex models to be rendered, coming from the real world or from the designer’s imagination. However, scene modeling is a very difficult task, asthere is a need of more and more complex scenes and traditional geometric modelers are not well...
Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
The Asia Simulation Conference 2006 (JSST 2006) was aimed at exploring challenges in methodologies for modeling, control and computation in simulation, and their applications in social, economic, and financial fields as well as established scientific and engineering solutions. The conference was held in Tokyo from October 30 to November 1, 2006,...
Vocabulary 4000 : The 4000 Words Essential for an Educated Vocabulary
Vocabulary 4000 : The 4000 Words Essential for an Educated Vocabulary
English offers perhaps the richest vocabulary of all languages, in part because its words are culled from so many languages. It is a shame that we do not tap this rich source more often in our daily conversation to express ourselves more clearly and precisely. Many a vocabulary book lists esoteric words we quickly forget or feel...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Programming Microsoft SQL Server 2008 (PRO-Developer)
Programming Microsoft SQL Server 2008 (PRO-Developer)

Written by industry professionals who have been working with SQL Server 2008 since the earliest code, this reference expertly covers the programming fundamentals for SQL Server 2008 with crucial real-world context and extensive code samples.

Get the hands-on programming instruction, practical examples, and best practices you
...

Algorithm Design
Algorithm Design
Algorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the...
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Intermediate Spanish For Dummies (Language & Literature)
Intermediate Spanish For Dummies (Language & Literature)
As someone who has surpassed the beginning level of Spanish, you consider yourself rather proficient in the language and want to discover more. So, here you are, eager to jump up to a higher level and perfect your skills. That’s fantastic! Whether you’re planning a trip, engaging in business with Spanish speakers, or are just a lover of...
Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities
Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities

Everyday we face decisions that carry an element of risk and uncertainty. The ability to analyze, predict, and prepare for the level of risk entailed by these decisions is, therefore, one of the most constant and vital skills needed for analysts, scientists and managers.

Risk analysis can be defined as a systematic use of...

Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy