Home | Amazing | Today | Tags | Publishers | Years | Search 
A Walk through the Southern Sky: A Guide to Stars and Constellations and their Legends
A Walk through the Southern Sky: A Guide to Stars and Constellations and their Legends
What star is that? Where is the Southern Cross? Who was Orion? Answering these questions and many more, this book will become an essential traveling companion for amateur astronomers heading abroad. Its unique simplified maps make it easy to find the constellations in the southern hemisphere skies, and the stars within them. Clear instructions...
Sams Teach Yourself XML in 24 Hours (2nd Edition)
Sams Teach Yourself XML in 24 Hours (2nd Edition)
Sams Teach Yourself XML in 24 Hours, Second Edition focuses on teaching the reader the fundamental concepts of XML using practical, hands-on examples. Rather than dwelling on dry theory, the book is filled with clear, real-world examples of how the technology can be used today.

This book includes coverage of topics such as:

* Displaying...

Clustering Windows Server: A Road Map for Enterprise Solutions
Clustering Windows Server: A Road Map for Enterprise Solutions
During the final decade of the twentieth century, Microsoft achieved historic levels of marketing success in the computing business. Microsoft offered an alternative so economically appealing to the computing industry that resistance seemed futile in all but a few cases.

Two questions remain. First, “Is there a solution to the
...
Head First JavaScript
Head First JavaScript
So you're ready to make the leap from writing HTML and CSS web pages to creating dynamic web applications. You want to take your web skills to the next level. And you're finally ready to add "programmer" to the resume. It sounds like you're ready to learn the Web's hottest programming language: JavaScript. Head First JavaScript...
51 High-Tech Practical Jokes for the Evil Genius
51 High-Tech Practical Jokes for the Evil Genius
Give your friends and family the shock of their lives! 51 High-Tech Practical Jokes for the Evil Genius has everything you need to pull devastatingly funny (and safe!) technical pranks. From the “evasive beeping thing” to “rats in the walls” to the “rigged lie detector,” you’ll find a plethora of...
Pro SQL Server 2005 Integration Services
Pro SQL Server 2005 Integration Services
SQL Server Integration Services is groundbreaking. It exists for both the DBA and the developer, as well as that new role SSIS has created between the two--the data artisan.

Pro SQL Server 2005 Integration Services contains everything you could ever hope to know about this exciting new development from Microsoft: developer insight,...

Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer
Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer
We dance around in a circle and suppose, while the secret sits in the middle and knows. (Frost, 1971)

It is the laborious life of scientific research that requires us to continually presume, then find support for our presumptions, which either stand the test of time or fall prey to falsifying evidence only to be replaced by new ideas and
...
Living Water: Viktor Schauberger and the Secrets of Natural Energy
Living Water: Viktor Schauberger and the Secrets of Natural Energy
Many people suggested that I write a book on Viktor Schauberger, the extraordinary natural scientist, inventor and philosopher. Already in the 1920s he forewarned us, in speeches and articles, of the environmental crisis in which we are now caught and from which we seem to have little hope of escaping. In his lifetime he met mostly resistance and...
Modern Coding Theory
Modern Coding Theory
Having trouble deciding which coding scheme to employ, how to design a new scheme, or how to improve an existing system? This summary of the state-of-the-art in iterative coding makes this decision more straightforward. With emphasis on the underlying theory, techniques to analyse and design practical iterative coding systems are presented. Using...
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy