Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing Interactive Systems: A Comprehensive Guide to HCI and Interaction Design (2nd Edition)
Designing Interactive Systems: A Comprehensive Guide to HCI and Interaction Design (2nd Edition)
Designing Interactive Systems is aimed squarely at the next generation of interactive system designers. This book presents a coherent introduction to the practical issues of creating interactive systems and products from a human-centred perspective. It develops the principles and methods of human–computer interaction (HCI)...
Java EE 5 Development with NetBeans 6
Java EE 5 Development with NetBeans 6

Java EE 5, the successor to J2EE, greatly simplifies the development of enterprise applications. The popular IDE, NetBeans, has several features that greatly simplify Java EE 5 development, and this book shows you how to make use of these features to make your Java programming more efficient and productive than ever before. With many features...

The Handbook of Nanotechnology: Business, Policy, and Intellectual Property Law
The Handbook of Nanotechnology: Business, Policy, and Intellectual Property Law
"This Handbook is sure to become the ultimate sourcebook for everyone involved in the emerging field of nanotechnology. I would strongly recommend that any entrepreneur who wishes to begin a nanotechnology company and any investor who wishes to seek funding opportunities in nanotechnology read this work cover to cover. By providing the tools...
E-health Systems Diffusion And Use: The Innovation, the User And the Use It Model
E-health Systems Diffusion And Use: The Innovation, the User And the Use It Model
E-Health Systems Diffusion and Use: The Innovation, the User and the Use IT Model offers an overview of the use and diffusion of information systems in the health care sector with particular attention to the role of the user. This book starts with classic contributions and modifications and then continues with contemporary contributions, which...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Multivariable Control Systems: An Engineering Approach (Advanced Textbooks in Control and Signal Processing)
Multivariable Control Systems: An Engineering Approach (Advanced Textbooks in Control and Signal Processing)

Multivariable control techniques solve issues of complex specification and modelling errors elegantly but the complexity of the underlying mathematics is much higher than presented in traditional single-input, single-output control courses.

Multivariable Control Systems focuses on control...

The Slayer's Guide To Derro
The Slayer's Guide To Derro
The derro have long been a mysterious race, hiding in darkness, their presence frequently but a whisper. Brought to the fore in this supplement, their culture, habitats, methods of warfare, and more are detailed in full so as to be usable by game masters and players alike.

The dwarven racesarequitediverse,but perhapsthe most deviant,
...
Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

The 8051 Microcontroller: Architecture, Programming, and Applications
The 8051 Microcontroller: Architecture, Programming, and Applications
Designed as a main or supplementary text for courses on microprocessors or microcontrollers. Packaged with a customized disk containing an 8051 assembler and 8051 simulator. Focuses on programming the Intel 8051 microcontroller, one of the most common microprocessors used in controls or instrumentation applications using assembly code. Text has...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Robust Control Systems with Genetic Algorithms (Control Series)
Robust Control Systems with Genetic Algorithms (Control Series)

In recent years, new paradigms have emerged to replace-or augment-the traditional, mathematically based approaches to optimization. The most powerful of these are genetic algorithms (GA), inspired by natural selection, and genetic programming, an extension of GAs based on the optimization of symbolic codes.

Robust
...

Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy