Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
Total Area Networking ATM,IP, Frame Relay and SMDS Explained Second Edition John Atkins and Mark Norris BT, UK Total Area Networking explains how high-speed communications allow local facilities to become part of a more global network. This concept is the essential basis for super-connectivity, when the user sees a distributed set of network-based...
Thinking Animation: Bridging the Gap Between 2D and CG
Thinking Animation: Bridging the Gap Between 2D and CG
Learn how to think before you animate. Thinking Animation is a one-of-a-kind book that emphasizes how artists can use traditional animation techniques and principles with the computer generated animation technology of today. Written by seasoned animators with experience in both 2D and CG, Thinking Animation is an exquisite guide aimed at...
About Face 3: The Essentials of Interaction Design
About Face 3: The Essentials of Interaction Design
When the first edition of About Face was published in 1995, the idea of designing products based on human goals was a revolutionary concept. Thanks to the work of Alan Cooper and other pioneers, interaction design is now widely recognized as a unique and vital discipline, but our work is far from finished.

This completely updated volume...

Software Testing and Analysis: Process, Principles and Techniques
Software Testing and Analysis: Process, Principles and Techniques
The first comprehensive book on software test and analysis

You can't “test quality into” a software product, but neither can you build a quality software product without test and analysis.  Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in...

High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

Ext JS Data-driven Application Design (Community Experience Distilled)
Ext JS Data-driven Application Design (Community Experience Distilled)

Learn how to build a user-friendly database in Ext JS using data from an existing database with this step-by-step tutorial. Takes you from first principles right through to implementation.

Overview

  • Discover how to layout the application structure with MVC and Sencha Cmd
  • Learn to use Ext...
Designing Machine Learning Systems with Python
Designing Machine Learning Systems with Python

Design efficient machine learning systems that give you more accurate results

About This Book

  • Gain an understanding of the machine learning design process
  • Optimize machine learning systems for improved accuracy
  • Understand common programming tools and techniques for machine...
Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Never Bet the Farm: How Entrepreneurs Take Risks, Make Decisionsand How You Can, Too
Never Bet the Farm: How Entrepreneurs Take Risks, Make Decisionsand How You Can, Too
In Never Bet the Farm two leading entrepreneurs, Anthony Iaquinto and Stephen Spinelli, turn much of the so-called expert advice for entrepreneurs on its head. They show that by preparing for setbacks and using a framework that can help reduce risks and simplify decision making, entrepreneurs can increase their probability for success....
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP

Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques...

unlimited object storage image
Result Page: 288 287 286 285 284 283 282 281 280 279 278 277 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy