Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Microsoft Virtual Server 2005 (Programmer to Programmer)
Professional Microsoft Virtual Server 2005 (Programmer to Programmer)
Get ready to tap into the full potential of your system and dramatically improve your development and testing environment. From installation and configuration to clustering and performance enhancements, this book shows you how to get the most out of Microsoft Virtual Server. Written by a key member of the Virtual Server product team, it focuses on...
OpenVMS Alpha Internals and Data Structures: Memory Management (HP Technologies)
OpenVMS Alpha Internals and Data Structures: Memory Management (HP Technologies)
OpenVMS Alpha Internals and Data Structures: Memory Management is an update
to selected parts of the book OpenVMS AXP Internals and Data Structures Version 1.5 (Digital Press, 1994). This book covers the extensions to the memory management subsystem of OpenVMS Alpha to allow the operating system and applications to access 64 bits of address
...
The Power of Persuasion: How We're Bought and Sold
The Power of Persuasion: How We're Bought and Sold

"An engaging, highly readable survey of the sophisticated methods of persuasion we encounter in various situations. From television to telemarketing and from self-deception to suicide cults, Levine takes a hard look at all the ways we attempt to persuade each other--and how and why they work (or don't). . . . The next time you wonder...

Microsoft(r) SQL Server(tm) 2005 Developer's Guide
Microsoft(r) SQL Server(tm) 2005 Developer's Guide
CREATE ROBUST DATA MANAGEMENT AND BUSINESS INTELLIGENCE APPLICATIONS

Build powerful, enterprise-wide database programs using Microsoft SQL Server 2005 and the comprehensive information contained in this definitive volume. Microsoft SQL Server 2005 Developer's Guide explains how to develop server-side and client-side...

Essential C++ for Engineers and Scientists (2nd Edition)
Essential C++ for Engineers and Scientists (2nd Edition)

Essential C++ for Engineers and Scientists zeros in on the key elements of good programming and C++, using a multitude of interesting and appropriate engineering and scientific examples. This book covers the features of C++ needed for writing engineering programs, including many features of object-oriented programming. Early on, the book...

Underactuated Robotic Hands (Springer Tracts in Advanced Robotics)
Underactuated Robotic Hands (Springer Tracts in Advanced Robotics)
Grasping and manipulation skills are at the core of the development of modern robotic systems. With the introduction of robotics in new applications involving unstructured environments (e.g. space, undersea, surgery), intelligent manipulation and grasping has become a crucial research area. The authors have developed an internationally recognized...
Beyond jQuery
Beyond jQuery
Beyond jQuery gives you the confidence to abandon your jQuery crutches and walk freely with the power of the "web API" and JavaScript! Learn about the most important concepts surrounding web development as the mystic powers of jQuery are explained, allowing you to forgo this seemingly quintessential library in your software...
Cloud Data Design, Orchestration, and Management Using Microsoft Azure: Master and Design a Solution Leveraging the Azure Data Platform
Cloud Data Design, Orchestration, and Management Using Microsoft Azure: Master and Design a Solution Leveraging the Azure Data Platform
Use Microsoft Azure to optimally design your data solutions and save time and money. Scenarios are presented covering analysis, design, integration, monitoring, and derivatives.

This book is about data and provides you with a wide range of possibilities to implement a data solution on Azure, from hybrid cloud to PaaS
...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
Introduction to Process Algebra (Texts in Theoretical Computer Science. An EATCS Series)
Introduction to Process Algebra (Texts in Theoretical Computer Science. An EATCS Series)

Automated and semi-automated manipulation of so-called labelled transition systems has become an important means in discovering flaws in software and hardware systems. Process algebra has been developed to express such labelled transition systems algebraically, which enhances the ways of manipulation by means of equational logic and term...

Visual Media Processing Using Matlab Beginner's Guide
Visual Media Processing Using Matlab Beginner's Guide

Learn a range of techniques from enhancing and adding artistic effects to your photographs, to editing and processing your videos, all using Matlab

Overview

  • Apply sophisticated techniques to images and videos in just a few steps
  • Learn and practice techniques for enhancing and restoring your...
Decision Analysis for Management Judgment
Decision Analysis for Management Judgment
In an increasingly complex world, decision analysis has a major role
to play in helping decision makers to gain a greater understanding of
the problems they face. The main aim of this book is to make decision
analysis accessible to its largest group of potential users: managers
and administrators in business and public sector
...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy