Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Robustness and Complex Data Structures
Robustness and Complex Data Structures
Our journey towards this Festschrift started when realizing that our teacher, mentor, and friend Ursula Gather was going to celebrate her 60th birthday soon. As a researcher, lecturer, scientific advisor, board member, reviewer, editor, Ursula has had a wide impact...
Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
An Introduction to Numerical Analysis for Electrical and Computer Engineers
An Introduction to Numerical Analysis for Electrical and Computer Engineers
An engineer’s guide to numerical analysis

To properly function in today’s work environment, engineers require a working familiarity with numerical analysis. This book provides that necessary background, striking a balance between analytical rigor and an applied approach focusing on methods particular to the solving of engineering...

Bioinformatics For Dummies (Math & Science)
Bioinformatics For Dummies (Math & Science)
Search databases and analyze sequences like a pro

Get the most out of your PC and the Web with the right tools

Explore the human genome and analyze DNA — without leaving your desktop! All it takes is the basics of molecular biology and the wealth of information in this friendly guide. You'll discover the...

Microprocessor Theory and Applications with 68000/68020 and Pentium
Microprocessor Theory and Applications with 68000/68020 and Pentium
A self-contained introduction to microprocessor theory and applications

This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel® Pentium®. It begins with an overview of microprocessors—including...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

Engineering Science, Fifth Edition
Engineering Science, Fifth Edition
The most comprehensive engineering science text available - fully in line with the latest pre-degree course requirements

. Generic topic-based approach - ensures suitability for all vocational and pre-degree level students
. Coverage of all the mechanical, electrical and electronic principles
...
Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Result Page: 109 108 107 106 105 104 103 102 101 100 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy