Home | Amazing | Today | Tags | Publishers | Years | Search 
Pharmaceutical Compounding and Dispensing
Pharmaceutical Compounding and Dispensing

Pharmacists or their pharmaceutical equivalents have been responsible for compounding medicines for cen turies. Recently this role has been challenged in the pharmaceutical literature with suggestions and recom mendations that it is inappropriate for the pharmaceu tical practitioner to compound medicines in a local pharmacy...

Creating Games with Unity and Maya: How to Develop Fun and Marketable 3D Games
Creating Games with Unity and Maya: How to Develop Fun and Marketable 3D Games

The Unity Game Engine has been shaking things up. The engine is only a little over five years old now and in 2010 they have earned Develop Magazine's Grand Prix Award and surpassed 170,000 developers. The user base of consuming Unity products has grown dynamically as well. There are over 30 million total Unity Web Player...

Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)
Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)

The specifications in this book are the result of a number of case studies performed by researchers from the Programming Research Group at the University of Amsterdam. The primary goal was to study the use of the techniques developed by the Programming Research Group for the specification of real-life protocols. From the pool of...

Nontraditional Database Systems (Advanced Information Processing Technology, 5)
Nontraditional Database Systems (Advanced Information Processing Technology, 5)

This book contains selected research results on non-traditional database systems from Japanese database research community. In traditional database research, the main emphases is how to process a large amount of fixed structured data with minimum amount of selected resources (processing time, communication overhead, memory size,...

Joomla! Explained: Your Step-by-Step Guide (Joomla! Press)
Joomla! Explained: Your Step-by-Step Guide (Joomla! Press)

This book was written for my Dad and for people like you.

I teach Joomla! classes all across the United States and talk with people like you who have tried to learn Joomla and other software.

They order books, watch videos, read online documentation, and go to other classes. Many are frustrated and say the same...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Nuke 101: Professional Compositing and Visual Effects
Nuke 101: Professional Compositing and Visual Effects

The Foundry’s Nuke is fast becoming the industry leader in compositing software for film and TV. Virtually all the leading visual effects studios—ILM, Digital Domain, Weta Digital, MPC, Framestore, The Mill, and Sony Pictures Imageworks—now use Nuke as their main compositing tool. This is not surprising, as Nuke offers...

MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory
MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory

This training kit is designed for IT professionals who support or plan to support Microsoft Active Directory (AD) on Windows Server 2008 R2 and who also plan to take the Microsoft Certified Technology Specialist (MCTS) 70-640 examination. It is assumed that you have a solid foundation-level understanding of Microsoft Windows...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Introduction to Microcontrollers: Architecture, Programming, and Interfacing of the Motorola 68Hc12 (Engineering)
Introduction to Microcontrollers: Architecture, Programming, and Interfacing of the Motorola 68Hc12 (Engineering)

Introduction to Microcontrollers is a comprehensive introductory text/reference for electrical and computer engineers, students, and even hobbyists who have little experience in a high-level programming language. The book helps them understand how a typical microcontroller executes assembly language instructions and addressing modes on...

Interactive Storytelling for Video Games: A Player-Centered Approach to Creating Memorable Characters and Stories
Interactive Storytelling for Video Games: A Player-Centered Approach to Creating Memorable Characters and Stories

What really makes a video game story interactive? What's the best way to create an interactive story? How much control should players be given? Do they really want that control in the first place? Do they even know what they want-or are their stated desires at odds with the unconscious preferences? All of these questions and more are...

Result Page: 646 645 644 643 642 641 640 639 638 637 636 635 634 633 632 631 630 629 628 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy