Home | Amazing | Today | Tags | Publishers | Years | Search 
Introducing Reason 4
Introducing Reason 4
Welcome to Introducing Reason 4. Whether you already have experience with digital music creation or are completely new to it, you are probably aware that the possibilities available today for creating music in the digital environment are truly staggering. Over the last decade as computers have gotten faster and available storage space has...
Practical TCP/IP: Designing, Using, and Troubleshooting TCP/IP Networks on Linux(R) and Windows(R)
Practical TCP/IP: Designing, Using, and Troubleshooting TCP/IP Networks on Linux(R) and Windows(R)
Practical TCP/IP is the only book you need to ensure that your networks work. With this book you learn by doing as well as reading. Split into 4 Parts, this book has a unique modular approach that facilitates in-depth and easy learning. The detailed appendices make this a desktop book you cannot be without.

Based on years of...

Nonlinear Digital Filters: Analysis and Applications
Nonlinear Digital Filters: Analysis and Applications
This book provides an easy to understand overview of nonlinear behavior in digital filters, showing how it can be utilized or avoided when operating nonlinear digital filters. It gives techniques for analyzing discrete-time systems with discontinuous linearity, enabling the analysis of other nonlinear discrete-time systems, such as sigma delta...
IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Unconventional Computation: 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008, Proceedings
Unconventional Computation: 7th International Conference, UC 2008, Vienna, Austria, August 25-28, 2008, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Unconventional Computation, UC 2008, held in Vienna, Austria, in August 2008.

The 16 revised full papers presented together with 4 invited papers were carefully reviewed and selected for inclusion in the book. The papers are devoted to all aspects of...

Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
"I think this book will be the first standard introductory book on mobile agents." José M. Vidal, University of South Carolina
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are
...
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
Querying XML, : XQuery, XPath, and SQL/XML in context (The Morgan Kaufmann Series in Data Management Systems)
Querying XML, : XQuery, XPath, and SQL/XML in context (The Morgan Kaufmann Series in Data Management Systems)
There is no more authoritative pair of authors on Querying XML than Jim Melton and Stephen Buxton. Best of all, as readers of Jim's other books know, his informal writing style will teach you what you need to know about this complex subject without giving you a headache. If you need a comprehensive and accessible overview of Querying XML, this...
Lighting for Digital Video & Television, Second Edition
Lighting for Digital Video & Television, Second Edition
Digital video students and enthusiasts must learn lighting fundamentals and techniques to enhance the visual quality of their work. Moreover, since lighting specifications for digital video differ significantly from those for analog video or film, professional videographers and cinematographers must learn how to adapt their lighting skills for this...
Linux Networking Clearly Explained
Linux Networking Clearly Explained

"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained

Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux
...

Result Page: 729 728 727 726 725 724 723 722 721 720 719 718 717 716 715 714 713 712 711 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy