|
|
|
|
|
|
The Princeton Companion to Mathematics
This is a one-of-a-kind reference for anyone with a serious interest in mathematics. Edited by Timothy Gowers, a recipient of the Fields Medal, it presents nearly two hundred entries, written especially for this book by some of the world's leading mathematicians, that introduce basic mathematical tools and vocabulary; trace the... | | Set Your Voice Free
Roger Love, vocal coach of the Beach Boys, the Jacksons, Chicago, and Hanson, among many other singing superstars, and voice coach to celebrity speakers such as John Gray, Dr. Laura Schlessinger, and Anthony Robbins, reveals in this book and CD package the secrets to getting the singing or speaking voice you want. Now you can love the sound... | | Developing Time-Oriented Database Applications in SQLWhat is everywhere but occupies no space; can be measured but not seen or touched; can be spent, wasted, or killed, but not destroyed or changed? The simple answer is time, and the relationship between the fourth dimension and data is the foundation for Developing Time-Oriented Database Applications in SQL, a fascinating book by Richard T.... |
|
OpenGL Graphics Through ApplicationsThis book is the result of teaching computer graphics for one and two semester, year two/three undergraduate and postgraduate lecture courses in Computer Graphics. Throughout the book, theory is followed by implementation using C/C++ and complete programs are provided with suggestions for change to enhance student understanding. During 30 years of... | | Pro LINQ Object Relational Mapping in C# 2008It is nearly impossible today to write enterprise software without the use of one or more relational databases. Granted, there are cases when the data is transient and not stored in a database, but for the most part, software needs to consume and manipulate data in a database. It sounds easy, but there are hundreds of ways to connect software... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |
|
|
Result Page: 7 6 5 4 3 2 1 |