Home | Amazing | Today | Tags | Publishers | Years | Search 
Microprocessor Theory and Applications with 68000/68020 and Pentium
Microprocessor Theory and Applications with 68000/68020 and Pentium
A self-contained introduction to microprocessor theory and applications

This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel® Pentium®. It begins with an overview of microprocessors—including...

Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Essential C# 3.0: For .NET Framework 3.5 (2nd Edition)
Essential C# 3.0: For .NET Framework 3.5 (2nd Edition)
THROUGHOUT THE HISTORY of software engineering, the methodology used to write computer programs has undergone several paradigm shifts, each building on the foundation of the former by increasing code organization and decreasing complexity. This book takes you through these same paradigm shifts.

The beginning chapters take you through
...
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably.

Artificial Crime Analysis Systems: Using Computer...

Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Making Your Own Telescope
Making Your Own Telescope
Complete, detailed instructions and numerous diagrams for constructing a do-it-yourself telescope. No complicated mathematics are involved, and no prior knowledge of optics or astronomy is needed to follow the text's step-by-step directions. Contents cover, among other topics, materials and equipment; tube parts and alignment; eyepieces, and...
Bookkeeping Workbook For Dummies (Business & Personal Finance)
Bookkeeping Workbook For Dummies (Business & Personal Finance)
If you're preparing for The American Institute of Professional Bookkeepers' (AIPB) bookkeeping certification test, you need an easy- to-follow test-preparation guide that gets you up to speed quickly in all of the bookkeeping basics, from setting up a company's books and recording transactions to managing employee payroll, handling government...
Basic BASIC: An introduction to computer programming in BASIC language (Hayden computer programming series)
Basic BASIC: An introduction to computer programming in BASIC language (Hayden computer programming series)
With the increasing availability of computer access through remote terminals and time sharing, more and more schools and colleges are able to introduce programing to substantial numbers of students. This book is an attempt to incorporate computer programming, using BASIC language, and the teaching of mathematics. The general approach of the book is...
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
Killer Web Content: Make the Sale, Deliver the Service, Build the Brand
Killer Web Content: Make the Sale, Deliver the Service, Build the Brand
"Genius! Gerry McGovern gets it! If you read one book on managing a website, this is it. A must read for any web manager in any organization, large or small, government or private."-Bev Godwin, director of FirstGov.gov

Written by an internationally acclaimed specialist in this field, Killer Web Content provides the strategies...

Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

Winning with Software: An Executive Strategy (SEI Series in Software Engineering)
Winning with Software: An Executive Strategy (SEI Series in Software Engineering)

When I mention software to senior executives, I get lots of reactions. Most are frustrated. They complain about missed commitments, quality problems, and unpleasant surprises. Others have been less closely involved. Software was a problem, but those problems have been handled. No one mentions the business opportunities of...

Result Page: 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy