Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Facebook and Philosophy: What's on Your Mind? (Popular Culture and Philosophy)
Facebook and Philosophy: What's on Your Mind? (Popular Culture and Philosophy)
Facebook and Philosophy is an entertaining, multi-faceted exploration of what Facebook means for us and for our relationships. With discussions ranging from the nature of friendship and its relationship to "friending," to the (debatable) efficacy of "online activism," this book is the most extensive and systematic...
Applied Interval Analysis
Applied Interval Analysis

This book is about guaranteed numerical methods based on interval analysis for approximating sets, and about the application of these methods to vast classes of engineering problems. Guaranteed means here that inner and outer approximations of the sets of interest are obtained, which can be made as precise as desired, at the cost of...

Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Pro SQL Server 2012 Administration (Professional Apress)
Pro SQL Server 2012 Administration (Professional Apress)

Pro SQL Server 2012 Administration is a one-stop source for all the knowledge you'll need to professionally manage a database under Microsoft SQL Server 2012. SQL Server administration is a complex field requiring an unusually broad and well-rounded skill set. A good database administrator must be part system...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
Maya: Secrets of the Pros
Maya: Secrets of the Pros
In this unique full-color book, a cadre of professionals led by Maya expert and best-selling author, John Kundert-Gibbs, team up to share what they’ve learned using Maya in the CG trenches.

Contributing authors include veterans of such high-profiles projects as The Lord of the Rings trilogy, Final Fantasy: The Spirits...

Pro Tools 101: Official Courseware
Pro Tools 101: Official Courseware
Digidesign's Official Pro Tools 101 Courseware takes a comprehensive approach to learning the fundamentals of Pro Tools/HD, Pro Tools LE, or Pro Tools M-Powered systems. Now updated for Pro Tools 7 software, this new edition from the definitive authority on Pro Tools covers everything you need to know to complete a Pro Tools project. Learn to build...
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

Advanced Web Metrics with Google Analytics
Advanced Web Metrics with Google Analytics

Get the latest information about using the #1 web analytics tool from this fully updated guide

Google Analytics is the free tool used by millions of web site owners to assess the effectiveness of their efforts. Its revised interface and new features will offer even more ways to increase the value of your web site, and this...

Twisted Network Programming Essentials
Twisted Network Programming Essentials

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using...

Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
unlimited object storage image
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy