Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Knowing Fictions: Picaresque Reading in the Early Modern Hispanic World (Haney Foundation Series)
Knowing Fictions: Picaresque Reading in the Early Modern Hispanic World (Haney Foundation Series)

European exploration and conquest expanded exponentially in the late fifteenth and sixteenth centuries, and as the horizons of imperial experience grew more distant, strategies designed to convey the act of witnessing came to be a key source of textual authority. From the relación to the captivity narrative, the...

Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs
Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs

The first two editions of Effective C++ were embraced by hundreds of thousands of programmers worldwide. The reason is clear: Scott Meyers' practical approach to C++ describes the rules of thumb used by the experts—the things they almost always do or almost always avoid doing—to produce clear, correct, efficient code.The book...

Pattern-Oriented Software Architecture, Volume 2, Patterns for Concurrent and Networked Objects
Pattern-Oriented Software Architecture, Volume 2, Patterns for Concurrent and Networked Objects
Moreover, all the patterns in this book build on the same solid conceptual foundation as
those in the first POSA volume. For example, we use the same pattern categorization
schema, the same pattern description format, and present examples and known uses in
multiple programming languages, including C++, Java, and C.
Patterns for
...
Storage Area Networks: Designing and Implementing a Mass Storage System
Storage Area Networks: Designing and Implementing a Mass Storage System

The complete guide to SAN technology for every implementer and manager!

Every month, enterprises require more information, delivered faster, with greater reliability—and traditional data storage methods no longer suffice. Enter the Storage Area Network (SAN), which can store enormous...

Mobile Usability:  How Nokia Changed the Face of the Mobile Phone
Mobile Usability: How Nokia Changed the Face of the Mobile Phone

When it comes to delivering product design innovations to mobile device users, Nokia is the company against which all others are judged. Now, the philosophies and working methods by which Nokia revolutionized product usability are explained for the first time in Mobile Usability: Change the Face of the Mobile Phone.

Written with...

Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)

This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...

Flash Hacks : 100 Industrial-Strength Tips & Tools
Flash Hacks : 100 Industrial-Strength Tips & Tools

This collection offers expert Flash tips and tricks for optimization, creating interesting effects, ActionScript programming, sound and video effects, and much more--and you don't need to be an expert to use them (although you'll certainly look like one). Ranging from practical hacks to the fun and quirky, the book covers Flash MX,...

Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
In this practical reference, popular author Lewin Edwards shows how to develop robust, dependable real-time systems for robotics and other control applications, using open-source tools. It demonstrates efficient and low-cost embedded hardware and software design techniques, based on Linux as the development platform and operating system and the...
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

Lightwave 3D Character Animation
Lightwave 3D Character Animation
This book is for anyone who has ever had a character in their heart that they’ve wanted to bring to life with as much fluidity, power, and grace as can be seen in the best animated feature films. This is a book for anyone who has wanted to become an animator but hasn’t gone to Sheridan College in Toronto or CalArts in Valencia. This is...
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
unlimited object storage image
Result Page: 751 750 749 748 747 746 745 744 743 742 741 740 739 738 737 736 735 734 733 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy