Home | Amazing | Today | Tags | Publishers | Years | Search 
HTI+ Exam Cram 2
HTI+ Exam Cram 2

Welcome to the Home Technology Integrator (HTI+) Exam Cram 2! This book is designed to help you prepare to take—and pass—the Computing Technology Industry Association (CompTIA) certification exams HT0-101, "Residential Systems," and HT0-102, "Systems Infrastructure and Integration." This...

Drinking Water and Infectious Disease: Establishing the Links
Drinking Water and Infectious Disease: Establishing the Links

There still exists considerable uncertainty in many countries about the contribution of drinking water to sporadic cases of disease. The Organization for Economic Cooperation and Development (OECD), in cooperation with the World Health Organization (WHO), led the Workshop on Molecular Technologies for Safe Drinking Water in 1998 to address...

The NURBS Book (Monographs in Visual Communication)
The NURBS Book (Monographs in Visual Communication)

The second, revised edition of this book covers all aspects of non-uniform rational B-splines necessary to design geometry in a computer-aided environment. Basic B-spline features, curve and surface algorithms, and state-of-the-art geometry tools are all discussed. Detailed code for design algorithms and computational tricks are covered, too,...

Developing High Quality Data Models
Developing High Quality Data Models

I would like to start by explaining how I came to write this book, and to acknowledge its influences and the help I have received along the way.

I have been extremely fortunate. I have a wonderful wife and two wonderful grown-up children, and I have had all but thirty years working for Shell, which provided an environment...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Neural Networks and Their Applications
Neural Networks and Their Applications

Neural Networks started as an academic discipline over 50 years ago with the publication by McCulloch and Pitts of their famous result that any logical problem can be solved by a suitable network composed of so-called binary decision nodes. These are processors which make the simplest possible decision, that is, whether or not to respond to a...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench
Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench

Some TIME ago a group of mathematicians and computer scientists (including the editors of this volume) thought of making a scientific pilgrimage to the birthplace of al-Khw&rizmf, the outstanding ninth-century mathematician who gave his name to the word "algorithm". As his name indicates, al-Khwarizmi came from the Khorezm...

OpenCV 2 Computer Vision Application Programming Cookbook
OpenCV 2 Computer Vision Application Programming Cookbook

In today's digital world, images and videos are everywhere, and with the advent of powerful and affordable computing devices, it has never been easier to create sophisticated imaging applications. Plentiful software tools and libraries manipulating images and videos are offered, but for anyone who wishes to develop his/her own...

Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)
Methods for Mining and Summarizing Text Conversations (Synthesis Lecture on Data Management)

Before the invention of the Internet and the creation of the Web, the vast majority of human conversations were in spoken form, with the only notable, but extremely limited, exception being epistolary exchanges. Some important spoken conversations, such as criminal trials and political debates (e.g., Hansard, the transcripts of...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Node Web Development
Node Web Development

Welcome to the world of developing web software using Node (also known as Node.js). Node is a newly-developed software platform that liberates JavaScript from the web browser, enabling it to be used as a general software development platform in server-side applications. It runs atop the ultra-fast JavaScript engine from the Chrome browser,...

Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy