Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bioinformatics Programming Using Python: Practical Programming for Biological Data (Animal Guide)
Bioinformatics Programming Using Python: Practical Programming for Biological Data (Animal Guide)

Powerful, flexible, and easy to use, Python is an ideal language for building software tools and applications for life science research and development. This unique book shows you how to program with Python, using code examples taken directly from bioinformatics. In a short time, you'll be using sophisticated techniques and...

Independent Guide to the IPhone 4
Independent Guide to the IPhone 4

This comprehensive guide to the iPhone 4 - the world's most desirable mobile - is effectively the manual Apple forgot to supply with the handset. Covering all iPhone features and reviews for top applications, this is the only guide you'll need to make the most of your phone. If you've just bought an iPhone, this fully updated...

Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Handbook of Software Engineering and Knowledge Engineering, Volume 1
Handbook of Software Engineering and Knowledge Engineering, Volume 1

This is the first handbook to cover comprehensively both software engineering and knowledge engineering - two important fields that have become interwoven in recent years. Over 60 international experts have contributed to the book. Each chapter has been written in such a way that a practitioner of software engineering and knowledge...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!

Microsoft Visio 2010 is a bold new release. If you’re new to Visio, your timing is excellent! This version of Visio is easier to use than ever before and yet the diagrams you create can have more impact and style, and can present more real-world data than in any previous version.

If you’ve used prior versions...

VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

Multiparadigm Constraint Programming Languages (Cognitive Technologies)
Multiparadigm Constraint Programming Languages (Cognitive Technologies)

"Modeling" has become one of the primary concerns in modern Software Engineering. The reason is simple: starting development processes from clear and succinct models has proven to foster not only quality but also productivity. With the advance of modeling there also came a desire for automatic code generation from models....

Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
IBM DB2 9.7 Advanced Application Developer Cookbook
IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement. In this cookbook, you can find both: hands-on and real world practical application development examples, as well...
Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

The Machine Question: Critical Perspectives on AI, Robots, and Ethics
The Machine Question: Critical Perspectives on AI, Robots, and Ethics

One of the enduring concerns of moral philosophy is deciding who or what is deserving of ethical consideration. Much recent attention has been devoted to the "animal question" -- consideration of the moral status of nonhuman animals. In this book, David Gunkel takes up the "machine question": whether and to what extent...

unlimited object storage image
Result Page: 1204 1203 1202 1201 1200 1199 1198 1197 1196 1195 1194 1193 1192 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy