Home | Amazing | Today | Tags | Publishers | Years | Search 
Practicing Software Engineering in the 21st Century
Practicing Software Engineering in the 21st Century
This technological manual explores how software engineering principles can be used in tandem with software development tools to produce economical and reliable software that is faster and more accurate. Tools and techniques provided include the Unified Process for GIS application development, service-based approaches to business and information...
Sexual Murder: Catathymic and Compulsive Homicide
Sexual Murder: Catathymic and Compulsive Homicide
During graduate school, I had planned on a career in professional psychology with an emphasis on evaluating and treating children and adolescents. After a 2-year traineeship at a state hospital, I was ready to begin my clinical internship at the New Jersey Neuropsychiatric Institute in Princeton. Due to an administrative snafu, however, I was...
Interface Oriented Design
Interface Oriented Design
Interface-Oriented Design explores how you can develop software with interfaces that interact with each other. We’ll look at techniques for breaking down solutions into these interacting interfaces and then for determining appropriate implementations for these interfaces to create well-structured...
Underwater Concreting and Repair
Underwater Concreting and Repair
The construction of a wide range of structures including bridge piers, harbours, sea and river defences over many decades, and more recently the development of offshore oil fields, has required placement of concrete underwater. This process can be successfully carried out and sound, good quality concrete produced if sufficient attention is paid to...
Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

ImageMagick Tricks: Web Image Effects from the Command Line and PHP
ImageMagick Tricks: Web Image Effects from the Command Line and PHP
Unleash the power of ImageMagick with this fast, friendly guide. It's packed with examples of photo manipulations, logo creation, animations, and complete web projects. With this book up your sleeve, you'll be creating spellbinding images from code in no time. ImageMagick is a free software suite to create, edit, and compose bitmap images using...
The Healthy PC: Preventive Care and Home Remedies for Your Computer
The Healthy PC: Preventive Care and Home Remedies for Your Computer

Keep Your PC Running Smoothly--Without Spending a Lot of Money!

Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely...

Software Project Secrets: Why Software Projects Fail
Software Project Secrets: Why Software Projects Fail
Previously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the...
RF Mems Circuit Design for Wireless Communications
RF Mems Circuit Design for Wireless Communications
This book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Macromedia Dreamweaver 8 Unleashed
Macromedia Dreamweaver 8 Unleashed

The web developer's complete reference for developing dynamic, data-driven Web sites and applications with Dreamweaver.

  • Master the in-depth knowledge of Dreamweaver to get the most out of this versatile design and development program

  • ...
Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy