|
|
|
|
|
CCDA Exam Certification Guide (CCDA Self-Study, 640-861), Second EditionEvery partner company of Cisco Systems needs a number of Cisco-certified people on its staff. While the basic Cisco Certified Network Associate (CCNA) exam will satisfy basic Cisco requirements, the Cisco Certified Design Associate (CCDA) indicates more rigorous training and greater capability. Job applicants with CCDAs will outshine CCNAs every... | | Perioperative Transfusion MedicineThoroughly updated for its Second Edition, this volume is the most comprehensive, current reference on perioperative transfusion medicine and coagulation. It provides complete information on all current blood products and transfusion risks, transfusion and coagulation issues during the preoperative, intraoperative, and postoperative periods, and... | | Dialogue Processing in Spoken Language Systems: ECAI'96, Workshop, Budapest, Hungary, August 13, 1996, Revised PapersThis book constitutes the strictly refereed post-workshop documentation of the ECAI'96 Workshop on Dialogue Processing in Spoken Language Systems, held in Budapest, Hungary, in August 1996, during ECAI'96.
The volume presents 16 revised full papers including a detailed introduction and survey paper by the volume editors. The papers are... |
|
Pro Apache Log4j, Second EditionIn development scenarios where things can't be run in a debugger, or when you run the risk of masking the problem, logs are the greatest source of information about running a program. Pro Apache Log4j, Second Edition</i> provides best practices guidelines and comprehensive coverage of the most recent release.
Step by step, the book... | | The Physics of RugbyThis book began three decades ago, on a cold Saturday morning in early September. That was when I pulled on for the first time the scarlet jersey of Icknield, a high school named for a fierce tribe of Britons, the Iceni, who under their warrior queen Boadicea inflicted several heavy defeats upon the Romans. Our opponents that morning were from the... | | Information Security and Cryptology: 5th International Conference, Inscrypt 2009
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are... |
|
Handbook of Fruits and Fruit Processing
Fruits are botanically diverse, perishable, seasonal and predominantly regional in production. They come in many varieties, shapes and size, colors, flavors and textures and are an important part of a healthy diet and the global economy. Besides vitamins, minerals, fibers and other nutrients, fruits contain phenolic compounds that have... | | | | Trends in Functional Programming: Volume 5Covers all aspects of functional programming, both theoretical and practical, to provide a coherent overview of research's most recent developments. This book features: language design, proof and transformation, semantics and models, implementation, applications, type systems, parallelismand distribution, performance modelling and profiling,... |
|
|
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 |