Home | Amazing | Today | Tags | Publishers | Years | Search 
Audio Recording for Profit: The Sound of Money
Audio Recording for Profit: The Sound of Money
This book is the first real inside look at the business of professional audio recording, which fuels a multibillion dollar global music industry. Industry pioneer Chris Stone, founder of the legendary Record Plant, provides hard-earned business strategies, guidelines, and advice on every aspect of launching and managing a professional audio...
How to Build a Digital Library, Second Edition
How to Build a Digital Library, Second Edition

How to Build a Digital Library is the only book that offers all the knowledge and tools needed to construct and maintain a digital library, regardless of the size or purpose. It is the perfectly self-contained resource for individuals, agencies, and institutions wishing to put this powerful tool to work in their burgeoning information...

Solaris 10 System Administration Essentials
Solaris 10 System Administration Essentials

Solaris™ 10 System Administration Essentials is the first book to concisely yet comprehensively cover all of the breakthrough features of the Solaris 10 operating system. The Solaris OS has a long history of innovation, and the Solaris 10 OS is a watershed release that includes features such...

SAS 9.2 Companion for UNIX Environments
SAS 9.2 Companion for UNIX Environments
The UNIX Companion contains conceptual information about executing Base SAS in the UNIX operating environment. It contains descriptions of SAS language elements that have behavior specific to UNIX.

SAS 9.2 in UNIX environments has the following new and enhanced features:
  •  direct file I/O options
  • ...
Efficient Electrical Systems Design Handbook
Efficient Electrical Systems Design Handbook

The understanding of electrical system design has become increasingly important, not only to the electrical designer, but to safety, plant and project engineers as well. With the advent of high energy costs, plant and project engineers have needed to become more aware of electrical systems. Both safety and energy efficiency will be covered in...

Mahara 1.2 E-Portfolios: Beginner's Guide
Mahara 1.2 E-Portfolios: Beginner's Guide

Mahara is a user-centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. These views helps you display your artefacts - text files, spreadsheets, images, and videos - in a way you choose and to the people you want. You can also create online communities and social networks through...

Factory Planning Manual: Situation-Driven Production Facility Planning
Factory Planning Manual: Situation-Driven Production Facility Planning

This book describes the factory planning process with its manifold practical characteristics. Previous planning approaches only emanate from the product model. Future plannings need to allow for dissimilarity of an individual factory more strongly, i.e., the factory will feature even more individual characteristics according to its position...

SAS 9.1 SQL Procedure User's Guide
SAS 9.1 SQL Procedure User's Guide

Base SAS software supports Structured Query Language (SQL), the ANSI standard and widely used language that enables you to create, retrieve, and update database information. This title is your introductory, task-oriented resource for SQL as implemented through the SAS SQL procedure. With this title, you will learn the basics of using PROC...

Fermilab: Physics, the Frontier, and Megascience
Fermilab: Physics, the Frontier, and Megascience
Fermi National Accelerator Laboratory, located in the western suburbs of Chicago, has stood at the frontier of high-energy physics for nearly forty years. Since 1972, when the laboratory’s original particle accelerator began producing the world’s highest-energy protons for research, the government-supported scientific...
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy