Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Modeler's Workbench: Tools and Techniques for Analysis and Design
Data Modeler's Workbench: Tools and Techniques for Analysis and Design
"This book is chock-full of useful techniques and tips for improving data models and designs. And it’s an entertaining read as well–a terrific combination!"
–Wayne Eckerson, Director of Education and Research, The Data Warehousing Institute

A data model is the heart and soul of any application, providing a...

VEE Pro: Practical Graphical Programming
VEE Pro: Practical Graphical Programming
With VEE 7.0 Trial Version on CD-ROM From the depths of the oceans to the deserts of Mars, VEE Pro is being used to collect data, provide automated testing and to construct remote command and telemetry interfaces. In more everyday environments, it can be found at the heart of manufacturing, process and quality control, and industrial data analysis...
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
This book constГ­tutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of...
Assembly Language Step-By-Step
Assembly Language Step-By-Step
What astonishes me about learning how to program is not that it's so hard, but that it's so easy. Am I nuts? Hardly. It's just that my curse is the curse of a perfect memory, and I remember piano lessons. My poor mother paid $600 in 1962 for a beautiful cherrywood spinet, and every week for two years I trucked off to Wilkins School of Music for a...
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
The Ruby Way, Second Edition: Solutions and Techniques in Ruby Programming (2nd Edition)
The Ruby Way, Second Edition: Solutions and Techniques in Ruby Programming (2nd Edition)
Ruby is an agile object-oriented language, borrowing some of the best features from LISP, Smalltalk, Perl, CLU, and other languages. Its popularity has grown tremendously in the five years since the first edition of this book.

 

The Ruby Way takes a “how-to” approach to Ruby...

Hacking Roomba: ExtremeTech
Hacking Roomba: ExtremeTech

The jetsons would be proud

A gizmo as cool as Roomba just begs to be hacked. Now, with this book and the official ROI specification furnished by iRobot®, you can become the robotic engineer you dreamed of being when you were 10. Build a Bluetooth interface for your Roomba. Turn it into an artist....

Meditation For Dummies (Book and CD edition)
Meditation For Dummies (Book and CD edition)
"An easy-to-follow yet comprehensive introduction to the practice of meditation."

—John Gray, author of Men Are from Mars, Women Are from Venus

Research has proven that meditation relaxes the body, calms the mind, reduces stress, and enhances overall health and well-being. Whether you're new to meditation...

 
   
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy