|
|
|
|
|
Quick CORBA 3This book collects descriptions of the Object Management Group’s most powerful new CORBA and modeling specifications into a single volume. These specifications combine to give CORBA the capabilities it needs to support advanced Internet and enterprise computing. It includes almost all of the ten specifications originally labeled CORBA 3 (most... | | Handbook of Industrial and Hazardous Wastes Treatment
Environmental managers, engineers, and scientists who have had experience with
industrial and hazardous waste management problems have noted the need for a
handbook that is comprehensive in its scope, directly applicable to daily waste
management problems of specific industries, and widely acceptable by practicing
environmental... | | Studio Recording ProceduresHIT FACTORY RECORDING ENGINEER MIKE SHEA REVEALS THE SECRETS OF INCREDIBLE SOUND Only this unique guide teaches all the pros' secret techniques for creating amazing sound in the recording studio. This unique text brings recording studio equipment to life -- and shows you how to use it to create high-quality recordings,... |
|
|
WALCOM: Algorithms and Computation: 13th International Conference, WALCOM 2019, Guwahati, India, February 27 – March 2, 2019, Proceedings (Lecture Notes in Computer Science (11355))
This book constitutes the proceedings of the 13th International Conference and Workshop on Algorithms and Computation, WALCOM 2019, held in Guwahati, India, in February/ March 2019.
The 30 full papers presented were carefully reviewed and selected from 100 submissions. The papers are organized in topical headings on the... | | AutoCAD2008 and AutoCAD LT 2008: No Experience RequiredPresenting you with the perfect step-by-step introduction to the world’s leading CAD software, this this perennial bestseller is completely revised and features comprehensive, up-to-date coverage of the latest AutoCAD features, such as dynamic blocks, external references, and 3D design. You’ll get concise explanations and practical... | | Implementing 802.1X Security Solutions for Wired and Wireless NetworksWhen deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 |