|
|
|
|
Introduction to Robotics: Mechanics and ControlNow in its third edition, Introduction to Robotics by John J. Craig provides readers with real-world practicality with underlying theory presented. With one half of the material from traditional mechanical engineering material, one fourth control theoretical material, and one fourth computer science, the book covers rigid-body... | | Core CSS: Cascading Style Sheets (2nd Edition)The Complete and Comprehensive Web Developer's Guide to Style Sheets
Core CSS, 2nd Edition is a comprehensive guide that shows both beginning and expert Web developers all they need to know to achieve great results with the latest style sheet properties. In this example-rich book, Schengili-Roberts... | | Getting Started with Sun OneDirect from Sun, this is your step-by-step guide to delivering high-value solutions based on Sun ONE technologies. Sun ONE technical specialist Stacy Thurston brings together Sun's best practices for planning, designing, configuring, integrating, and implementing Sun ONE Internet infrastructures. Drawing on his immense experience supporting Sun ONE... |
|
Smart Cards: The Developer's ToolkitThe technical groundwork has been laid for wide-spectrum exploitation of smart card technology in both commercial and enterprise venues. Our goal in this book is to provide IT managers, system architects, system analysts, and application developers with the basic information about smart card technology that they need to open the tap on the... | | | | |
|
|
Derivatives Markets (3rd Edition) (Pearson Series in Finance)
To be financially literate in today’s market, one must have a solid understanding of derivatives concepts and instruments and the uses of those instruments in corporations. The Third Edition has an accessible mathematical presentation, and more importantly, helps readers gain intuition by linking theories and concepts... | | The Art of Computer NetworkingThis book, like so many, has grown from an undergraduate Networking course. Its current content is rather more than a single course could comfortably cover, though it is all relevant for an adventurer into the jungle of networks.
It is somewhat biased towards the Internet and the protocols the Internet uses, namely TCP/IP. Other network... | | Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his
chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made
furniture late in life that was in superficial respects the same as that which he made earlier,
but one can see his craft advance.
... |
|
|
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 |