Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Apple I Replica Creation: Back to the Garage
Apple I Replica Creation: Back to the Garage
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by...
Conceptual Modelling in Information Systems Engineering
Conceptual Modelling in Information Systems Engineering
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.

Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne...

Faster Smarter A+ Certification
Faster Smarter A+ Certification

Take the next step in your career by earning your CompTIA A+ certification the faster, smarter way. This innovative, high-energy guide makes the most of your study time by teaching exactly what you need for the A+ Core Hardware and Operating Systems Technologies exams. You get focused, no-fluff coverage of exam objectives—plus Test Smart...

Operating Systems Concepts with Java
Operating Systems Concepts with Java
An operating system is a program that acts as an intermediary between the user of a computer and the computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner.

Understanding the evolution of operating systems gives us an appreciation for
...
Statistical Applications for Health Information Management
Statistical Applications for Health Information Management
Published in conjunction with the American Health Information Management Association (AHIMA), Statistical Applications for Health Information Management, Second Edition covers the basic biostatistics, descriptive statistics, and inferential statistics that are unique to health information management (HIM). The text provides the essential theory...
Installing and Administering Linux, Second Edition
Installing and Administering Linux, Second Edition
An indispensable working resource for IT professionals moving to Linux-based network systems

More and more companies are now using Linux as their server operating system of choice. That’s because the costs are lower, there’s a greater amount of flexibility, and the code is much more reliable. As a result, there is a bigger demand...

Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Molecular Computation Models: Unconventional Approaches
Molecular Computation Models: Unconventional Approaches
With the increasing complexity of software systems and their widespread growth into many aspects of our lives, the need to search for new models, paradigms, and ultimately, technologies, to manage this problem is evident. The way nature solves various problems through processes evolving during billions of years was always an inspiration to many...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

3D Game Programming for Teens
3D Game Programming for Teens
"3D Game Programming for Teens" is a comprehensive, step-by-step introduction to 3D game programming for both teenagers and non-programmers. Organized into three parts, the book begins with an introduction to the game development industry, the game development process, and game engines including WildTangent. Part two covers JavaScript and...
Logic, Epistemology, and the Unity of Science
Logic, Epistemology, and the Unity of Science

The aim of the series Logic, Epistemology, and the Unity of Science, of which this is the first volume, is to take up anew the challenge of considering the scientific enterprise in its entirety in light of recent developments in logic and philosophy. Developments in logic are especially relevant to the current situation in philosophy of...

unlimited object storage image
Result Page: 744 743 742 741 740 739 738 737 736 735 734 733 732 731 730 729 728 727 726 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy