Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
This cram sheet contains the distilled, key facts about the Solaris 9 Network Administrator exam. Review this information just before you enter the testing center, paying special attention to those areas where you feel that you need the most review. You can transfer any of these facts from your head onto a blank sheet of paper immediately before...
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
"In recent years, comprehensive texts have been written for several of the other major areas of Artificial Intelligence, including machine learning, natural-language processing, and constraint-satisfaction processing, but until now, the field of planning has been devoid of such a resource, despite the considerable number of advances in and the...
System Modeling and Optimization : Proceedings of the 21st IFIP TC7 Conference
System Modeling and Optimization : Proceedings of the 21st IFIP TC7 Conference
This paper initiates a mathematical theory of aeroelasticity centered
on the canonical problem of the flutter boundary — an instability endemic
to aircraft that limits attainable speed in the subsonic regime.
We develop a continuum mathematical model that exhibits the known
flutter phenomena and yet is amenable to analysis
...
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Practical Unix & Internet Security, Second Edition
Practical Unix & Internet Security, Second Edition
This book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum...
Data Binding with Windows Forms 2.0 : Programming Smart Client Data Applications with .NET
Data Binding with Windows Forms 2.0 : Programming Smart Client Data Applications with .NET

"Data Binding with Windows Forms 2.0 earns a gold star and a prized place in my development book library. Brian is an exceptional teacher of technology, best practices, and technique. He continues to educate at every presentation I attend; his book...

Test-Driven Development in Microsoft .NET
Test-Driven Development in Microsoft .NET

With the clarity and precision intrinsic to the Test-Driven Development (TDD) process itself, experts James Newkirk, and Alexei Vorontsov demonstrate how to implement TDD principles and practices to drive lean, efficient coding—and better design. The best way to understand TDD is to see it in action, and Newkirk and Vorontsov walk you...

International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security ... in Intelligent Systems and Computing, 842)
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018: Applications and Techniques in Cyber Security ... in Intelligent Systems and Computing, 842)
The 2018 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Ningbo, China (2017), Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the sixth consecutive conference year in Shanghai....
AutoCAD 2004 for Dummies
AutoCAD 2004 for Dummies
Tour AutoCAD’s new features, make CAD standards rule, and find the friendlier xref. Once upon a time, architectural drawings were created with—gasp—pencils, paper, and T-squares. Then came AutoCAD, with all its capabilities and complications. While this book won’t turn back the clock, it will make it easy to explore...
Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming
Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming

Teach Your Kids to Code is a parent's and teacher's guide to teaching kids basic programming and problem solving using Python, the powerful language used in college courses and by tech companies like Google and IBM.

Step-by-step explanations will have kids learning computational thinking right away, while
...

Building an Optimizing Compiler
Building an Optimizing Compiler

This book describes one design for the optimization and code-generation phases of such a compiler. Many compiler books are available for describing the analysis of programming languages. They emphasize the processes of lexical analysis, parsing, and semantic analysis. Several books are also available for describing compilation processes for...

Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy