Home | Amazing | Today | Tags | Publishers | Years | Search 
MCITP: Windows Server 2008 Enterprise Administrator Study Guide: (Exam 70-647)
MCITP: Windows Server 2008 Enterprise Administrator Study Guide: (Exam 70-647)
Learn everything about Microsoft’s brand new MCITP: Windows Server 2008 Enterprise Administrator exam with the helpful information in MCITP: Windows Server 2008 Enterprise Administrator Study Guide (Exam 70-647, with CD). Find complete exam coverage, including exam objectives, real-world scenarios, hands-on exercises, and...
Palm OS Programming
Palm OS Programming
The PalmOS is the most widely-distributed operating system for handheld computers, with tens of millions of devices in use worldwide. Palm has a thriving developer community, with over 350,000 registered developers and countless hobbyist developers. The new edition of PalmOS Programming introduces the many updates to the PalmOS operating system...
Danger Pay: Memoir of a Photojournalist in the Middle East, 1984-1994 (Focus on American History)
Danger Pay: Memoir of a Photojournalist in the Middle East, 1984-1994 (Focus on American History)
"A deeply felt and moving account from an enterprising and conscientious news photographer who worked the always-busy beat of the Middle East in the last, great days of film photography." Rod Nordland, Chief Foreign Correspondent, Newsweek

"Reading Danger Pay was a harrowing experience. Being a photojournalist
...
Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards, Second Edition (Image Processing)
Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards, Second Edition (Image Processing)
Multimedia hardware still cannot accommodate the demand for large amounts of visual data. Without the generation of high-quality video bitstreams, limited hardware capabilities will continue to stifle the advancement of multimedia technologies. Thorough grounding in coding is needed so that applications such as MPEG-4 and JPEG 2000 may come to...
Virtual Futures for Design, Construction and Procurement
Virtual Futures for Design, Construction and Procurement
"For the knowledgeable reader in ICT research it is a must to confirm where technology is now and moreover to see where it is going in the future." Building Engineer

Bill Bygrave is the Director of the Center for Entrepreneurial Studies at Babson College, where he also teaches Free Enterprise.
...
Statistical Language Models for Information Retrieval (Synthesis Lectures on Human Language Technologies)
Statistical Language Models for Information Retrieval (Synthesis Lectures on Human Language Technologies)
As online information grows dramatically, search engines such as Google are playing a more and more important role in our lives. Critical to all search engines is the problem of designing an effective retrieval model that can rank documents accurately for a given query. This has been a central research problem in information retrieval for several...
Applied Computational Fluid Dynamics Techniques: An Introduction Based on Finite Element Methods
Applied Computational Fluid Dynamics Techniques: An Introduction Based on Finite Element Methods
Computational fluid dynamics (CFD) is concerned with the efficient numerical solution of the partial differential equations that describe fluid dynamics. CFD techniques are commonly used in the many areas of engineering where fluid behavior is an important factor. Traditional fields of application include aerospace and automotive design, and more...
Steam Generators: Description and Design
Steam Generators: Description and Design
The contents of this book originates from 35 years of teaching Steam Generators to graduate students at the Politecnico of Milan, Italy and from 45 years of professional activity in this area. This book has been written for practising designers, users, and engineers of steam generators in order to guide them through practical problems and help...
Distributed Systems Security: Issues, Processes and Solutions
Distributed Systems Security: Issues, Processes and Solutions

How to solve security issues and problems arising in distributed systems.

Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the...

Sukhoi Su-27: Famous Russian Aircraft
Sukhoi Su-27: Famous Russian Aircraft
In the late 1960s, the Soviet Union became aware that the U.S. was developing a new generation of jet fighters that had an exceptional range, heavy armor, and great agility in the air. These U.S. aircraft, the F-14 Tomcat, F-15 Eagle, F-16 Fighting Hornet, and F/A-18 Hornet dominated U.S. air power for three decades. In the context of the Cold War,...
RF & Wireless Technologies (Newnes Know It All)
RF & Wireless Technologies (Newnes Know It All)
RF & wireless technology enables laptops, cell phones, portable video games and much more - engineers can "Know It All with Newnes!"

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key
...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy