Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking MythTV (ExtremeTech)
Hacking MythTV (ExtremeTech)
Want control? Build your own MythTV PC.

You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,...

Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Learn How To Convert Web Data Into Web Knowledge

This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...

Photoshop CS3 Workflow: The Digital Photographer's Guide (Tim Grey Guides)
Photoshop CS3 Workflow: The Digital Photographer's Guide (Tim Grey Guides)
Set up an effective workflow and set your imagination free

If you're like most artists, the idea of structuring your work may seem at odds with true creativity, but you'll be surprised to learn from digital imaging expert Tim Grey that just the opposite is true. This latest edition of his bestselling guide to Photoshop shows you how proper...

Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing: Testing Across the Entire Software Development Life Cycle
Software Testing presents one of the first comprehensive guides to testing activities, ranging from test planning through test completion for every phase of software under development, and software under revision. Real life case studies are provided to enhance understanding as well as a companion website with tools and examples....
SQL All-in-One Desk Reference For Dummies (Computer/Tech)
SQL All-in-One Desk Reference For Dummies (Computer/Tech)

Master queries for any SQL database!

Your one-stop guide to building and maintaining relational databases with SQL

If you're looking for a good general reference on SQL, look no further. This all-in-one guide delivers the goods on all major SQL topics, from basic concepts to the...

Bioinformatics Biocomputing and Perl: An Introduction to Bioinformatics Computing Skills and Practice
Bioinformatics Biocomputing and Perl: An Introduction to Bioinformatics Computing Skills and Practice

Bioinformatics, Biocomputing and Perl presents an extended tutorial introduction to programming through Perl, the premier programming technology of the bioinformatics community. Even though no previous programming experience is assumed, completing the tutorial equips the reader with the ability to produce powerful custom...

After Effects Apprentice (DV Expert Series)
After Effects Apprentice (DV Expert Series)
If youre new to After Effects and want to get up to speed quickly, After Effects Apprentice was created just for you. With 11 core lessons plus a fun final project, youll quickly get into the program and learn how to tap its potential whether you want to create motion graphics for a network program, your companys video, or your own independent...
Web Component Development with Zope 3
Web Component Development with Zope 3
New Zope 3 is a web applications server written in Python that allows developing complex web applications rapidly and collaboratively. Zope 3 is the successor to the successful version 2.

After an introduction to the key concepts of Zope, a sample application is built and extended subsequently. The book is targeted towards developers familiar...

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
Network Analysis: Methodological Foundations (Lecture Notes in Computer Science)
‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific forms of network analysis are used in the study of diverse structures such as the Internet, interlocking directorates, transportation systems, epidemic spreading, metabolic pathways, the Web graph,...
Nortel Guide to VPN Routing for Security and VoIP
Nortel Guide to VPN Routing for Security and VoIP
Here's your handbook to Nortel VPN Router

If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN Router. Everything is here—hardware, software, laboratory set-ups, real-world examples, and, most importantly, advice gleaned from the...

Application-Specific Integrated Circuits (The VLSI Systems Series)
Application-Specific Integrated Circuits (The VLSI Systems Series)
This comprehensive book on application-specific integrated circuits (ASICs) describes the latest methods in VLSI-systems design. ASIC design, using commercial tools and pre-designed cell libraries, is the fastest, most cost-effective, and least error-prone method of IC design. As a consequence, ASICs and ASIC-design methods have become...
Result Page: 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy