Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
The Underwater Photographer, Third Edition: Digital and Traditional Techniques
The Underwater Photographer, Third Edition: Digital and Traditional Techniques
A superb hand-on manual containing a wealth of underwater tips, hints and advice - all beautifully illustrated with brand new, full colour images.

Martin Edge, a leading authority on underwater photography, will help you capture stunning effects using his popular 'think and consider' system - offering a heightened awareness and
...
Independent Guide to the IPhone 4
Independent Guide to the IPhone 4

This comprehensive guide to the iPhone 4 - the world's most desirable mobile - is effectively the manual Apple forgot to supply with the handset. Covering all iPhone features and reviews for top applications, this is the only guide you'll need to make the most of your phone. If you've just bought an iPhone, this fully updated...

Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

PCs: The Missing Manual
PCs: The Missing Manual

Your vacuum comes with one. Even your blender comes with one. But your PC--something that costs a whole lot more and is likely to be used daily and for tasks of far greater importance and complexity--doesn't come with a printed manual. Thankfully, that's not a problem any longer: PCs: The Missing...

Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Explore the new design discipline that is behind such products as the iPod and innovative Web sites like Flicer. While other books on this subject are either aimed at more seasoned practitioners or else are too focused on a particular medium like software, this guide will take a more holistic approach to the discipline, looking at interaction...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

SAS Functions by Example, Second Edition
SAS Functions by Example, Second Edition

Fully updated for SAS 9.2, Ron Cody's SAS Functions by Example, Second Edition, is a must-have reference for anyone who programs in Base SAS. With the addition of functions new to SAS 9.2, this comprehensive reference manual now includes more than 200 functions, including new character, date and time, distance, probability, sort, and...

Applied Mathematics for Science and Engineering
Applied Mathematics for Science and Engineering

Prepare students for success in using applied mathematics for engineering practice and post-graduate studies

• moves from one mathematical method to the next sustaining reader interest and easing the application of the techniques
• Uses different examples from chemical, civil, mechanical and various
...

S+Functional Data Analysis User's Guide
S+Functional Data Analysis User's Guide
S+Functional Data Analysis is the first commercial object oriented package for exploring, modeling, and analyzing functional data. Functional data analysis (FDA) handles longitudinal data and treats each observation as a function of time (or other variable). The functions are related. The goal is to analyze a sample of functions instead of a...
unlimited object storage image
Result Page: 100 99 98 97 96 95 94 93 92 91 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy