Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Middle Age (The Art of Living)
Middle Age (The Art of Living)

Middle age, for many, marks a key period for a radical reappraisal of one's life and way of living. The sense of time running out, both from the perspective that one's life has ground to a halt, and from the point of view of the greater closeness of death, and the sense of loneliness engendered by the compromised and wasteful nature...

The Handbook of Mobile Middleware
The Handbook of Mobile Middleware

The Handbook of Mobile Middleware provides an exhaustive overview of recent developments in the various fields related to how software supports mobile computing. This advanced reference authored by internationally recognized experts integrates the valuable insight gained from actual deployments into a full compendium. It begins by presenting...

Spring Live
Spring Live
This book is written for Java developers familiar with web frameworks. Its main purpose is for Java developers to learn Spring and evaluate it against other frameworks. One of my hopes is to compare Spring to other web frameworks, or at least show how it can be integrated with other frameworks (i.e. Struts, WebWork, maybe even Tapestry down the...
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)
OpenGL(R) Programming Guide: The Official Guide to Learning OpenGL(R), Version 2.1 (6th Edition)

OpenGL® Programming Guide, Sixth Edition

OpenGL is a powerful software interface used to produce high-quality, computergenerated images and interactive applications using 2D and 3D objects, bitmaps, and color images.

The OpenGL® Programming Guide, Sixth...

Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Twilight and Philosophy: Vampires, Vegetarians, and the Pursuit of Immortality (The Blackwell Philosophy and Pop Culture Series)
Twilight and Philosophy: Vampires, Vegetarians, and the Pursuit of Immortality (The Blackwell Philosophy and Pop Culture Series)
The first look at the philosophy behind Stephenie Meyer's bestselling Twilight series

Bella and Edward, and their family and friends, have faced countless dangers and philosophical dilemmas in Stephenie Meyer's Twilight novels. This book is the first to explore them, drawing on the wisdom of philosophical heavyweights to...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Mobile Broadcasting with WiMAX: Principles, Technology, and Applications
Mobile Broadcasting with WiMAX: Principles, Technology, and Applications
This book is exclusively dedicated to WiMAX. The focus of the book is on the applications of WiMAX networks, with delivery of multimedia content to wireless and mobile devices being the area of greatest attention. WiMAX has crossed a number of major milestones in the recent past. These include setting standards, adopting...
At Your Service: Service-Oriented Computing from an EU Perspective (Cooperative Information Systems)
At Your Service: Service-Oriented Computing from an EU Perspective (Cooperative Information Systems)

Service-Oriented Applications and Architectures (SOAs) have captured the interest of industry as a way to support business-to-business interaction, and the SOA market grew by $4.9 billion in 2005. SOAs and in particular service-oriented computing (SOC) represent a promising approach in the development of adaptive distributed systems. With...

The Politics of National Celebrations in the Arab Middle East (English and English Edition)
The Politics of National Celebrations in the Arab Middle East (English and English Edition)

Why do countries celebrate defining religious moments or significant events in their history, and how and why do their leaders select certain events for commemoration and not others? This book is the first systematic study of the role of celebrations and public holidays in the Arab Middle East from the fall of the Ottoman Empire to the...

Strategies and Tactics in Organic Synthesis, Volume 9
Strategies and Tactics in Organic Synthesis, Volume 9

A classic in the area of organic synthesis, Strategies and Tactics in Organic Synthesis provides a forum for investigators to discuss their approach to the science and art of organic synthesis. Rather than a simple presentation of data or a secondhand analysis, we are given stories that vividly demonstrate the power of the human...

Handbook of Research on Global Diffusion of Broadband Data Transmission
Handbook of Research on Global Diffusion of Broadband Data Transmission

Large investments have been made by various governments for the deployment of broadband within their respective nations; however, the citizens of such countries have demonstrated a slow adoption of this technology.

The Handbook of Research on Global Diffusion of Broadband Data Transmission explores broadband adoption and the...

unlimited object storage image
Result Page: 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy