Home | Amazing | Today | Tags | Publishers | Years | Search 
The Well-Grounded Rubyist
The Well-Grounded Rubyist
The Well-Grounded Rubyist takes you from interested novice to proficient practitioner. It's a beautifully written tutorial that begins with the basic steps to get your first Ruby program up and running and goes on to explore sophisticated topics like callable objects, reflection, and threading. Whether the topic is simple or tough, the...
Algorithms for Visual Design Using the Processing Language
Algorithms for Visual Design Using the Processing Language
How has design changed through the use of computers? Is it still valid to assume that a designer is in control of a design concept? What if there is a lack of predictability over what was intended by the designer and what came out on the computer’s screen? Is computer programming necessary in design today?

This book is about
...
Drupal 5 Views Recipes
Drupal 5 Views Recipes
The Views module is a powerful and flexible tool for displaying content on a Drupal site. Views came on the Drupal scene in 2005. Developed primarily by an awesome coder named Earl Miles with much input from other Drupalers, it has revolutionized the Drupal website developer experience.

This book offers step-by-step Views recipes for use
...
Mastering phpMyAdmin 3.1 for Effective MySQL Management
Mastering phpMyAdmin 3.1 for Effective MySQL Management

MySQL has gained wide popularity because of its open-source nature, performance, reliability, robustness, and support for various platforms.

phpMyAdmin is a web-based front-end to manage MySQL databases and has been adopted by a number of open-source distributors. It is one of the most widely used open-source applications written...

Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
Risk Analysis of Complex and Uncertain Systems (International Series in Operations Research & Management Science)
This book is motivated by the following convictions:

1) Quantitative risk assessment (QRA) can be a powerful discipline for improving risk management decisions and policies.
2) Poorly conducted QRAs can produce results and recommendations that are worse than useless.
3) Sound risk assessment methods provide the benefits of QRA
...
Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
Fat Manifolds and Linear Connections
Fat Manifolds and Linear Connections
The theory of connections is central not only in pure mathematics (differential and algebraic geometry), but also in mathematical and theoretical physics (general relativity, gauge fields, mechanics of continuum media). The now-standard approach to this subject was proposed by Ch. Ehresmann 60 years ago, attracting first mathematicians and...
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.

This book discusses the current and potential treatment technologies involved in
...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Image Processing for Computer Graphics and Vision (Texts in Computer Science)
Image Processing for Computer Graphics and Vision (Texts in Computer Science)
Image processing is concerned with the analysis and manipulation of images by computer. Providing a thorough treatment of image processing, with an emphasis on those aspects most used in computer graphics and vision, this fully revised second edition concentrates on describing and analyzing the underlying concepts of this subject.

 

...
FreeBSD Corporate Networker's Guide (With CD-ROM)
FreeBSD Corporate Networker's Guide (With CD-ROM)

"FreeBSD has been the secret weapon of serious network administrators for many years now and this book should provide a welcome introduction to those who have yet to discover it for themselves."
--Jordan Hubbard, Co-founder, The FreeBSD Project

FreeBSD is the engine that runs on some...

Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy