Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Race, Nation and Gender in Modern Italy: Intersectional Representations in Visual Culture (Mapping Global Racisms)
Race, Nation and Gender in Modern Italy: Intersectional Representations in Visual Culture (Mapping Global Racisms)

Finalist for the 2019 Edinburgh Gadda Prize

This book explores intersectional constructions of race and whiteness in modern and contemporary Italy. It contributes to transnational and interdisciplinary reflections on these issues through an analysis of political debates and social practices, focusing in particular...

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
Scientific Investigation of Copies, Fakes and Forgeries
Scientific Investigation of Copies, Fakes and Forgeries

The faking and forgery of works of art and antiquities is probably now more extensive than ever before. The frauds are aided by new technologies, from ink jet printers to epoxy resins, and driven by the astronomic prices realised on the global market.

This book aims to provide a comprehensive survey of the subject over a wide
...

Electrical Engineering: Principles and Applications (5th Edition)
Electrical Engineering: Principles and Applications (5th Edition)

For undergraduate introductory or survey courses in electrical engineering.

 

ELECTRICAL ENGINEERING: PRINCIPLES AND APPLICATIONS, 5/e helps students learn electrical-engineering fundamentals with minimal frustration. Its goals are to...

EJB 3.1 Cookbook
EJB 3.1 Cookbook

Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...

Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011
Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011

On behalf of the PROFES Organizing Committee we are proud to present the proceedings of the 12th International Conference on Product-Focused Software Process Improvement (PROFES 2011), held in Torre Canne, Italy. Since 1999 PROFES has grown in the software engineering community and has become a premium conference that brings together...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Pentaho Data Integration Cookbook Second Edition
Pentaho Data Integration Cookbook Second Edition

The premier open source ETL tool is at your command with this recipe-packed cookbook. Learn to use data sources in Kettle, avoid pitfalls, and dig out the advanced features of Pentaho Data Integration the easy way.

Overview

  • Intergrate Kettle in integration with other components of the Pentaho Business...
Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights
Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights

Design accessible and creative games across genres, platforms, and development realities

Key Features

  • Implement the skills and techniques required to work in a professional studio
  • Ace the core principles and processes of level design, world building, and storytelling
  • ...
Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
Introducing UNIX and Linux (Grassroots)
Introducing UNIX and Linux (Grassroots)
UNIX is an operating system which has seen substantial growth in its popularity over the last few years and is used by many universities and colleges, as well as in industry. Linux is a UNIX-like operating system for PCs which is freely available and has become a serious alternative to proprietary systems such as Windows. This book is a...
The Physics of Information Technology
The Physics of Information Technology
"...throughout the text, Gershenfeld retains much of the conversational tone and spontaneity of a lecture. At its best, this makes for enjoyable reading, with interesting tidbits and asides that enliven the discussions....Gershenfeld's book will be valuable for physical scientists looking for an enjoyable introduction to the information...
unlimited object storage image
Result Page: 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy