Home | Amazing | Today | Tags | Publishers | Years | Search 
Analytical Techniques in Materials Conservation
Analytical Techniques in Materials Conservation

This book will introduce the reader to the wide variety of analytical techniques that are employed by those working on the conservation of materials. An introduction to each technique is provided with explanations of how data may be obtained and interpreted. Examples and case studies will be included to illustrate how each technique is used...

Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

A Practical Guide to Distributed Scrum
A Practical Guide to Distributed Scrum

Succeed with Scrum in Even the Largest, Most Complex Distributed Development Projects

 

Forewords by Ken Schwaber, Scott Ambler, Roman Pichler, and Matthew Wang

 

This is...

Least Privilege Security for Windows 7, Vista, and XP
Least Privilege Security for Windows 7, Vista, and XP

Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on...

Satellite Systems for Personal Applications: Concepts and Technology
Satellite Systems for Personal Applications: Concepts and Technology

Presents the concepts, technology, and role of satellite systems in support of personal applications, such as mobile and broadband communications, navigation, television, radio and multimedia broadcasting, safety of life services, etc.

This book presents a novel perspective on satellite systems, reflecting the modern...

Standard Handbook of Machine Design
Standard Handbook of Machine Design

The definitive machine design handbook for mechanical engineers, product designers, project engineers, design engineers, and manufacturing engineers covers every aspect of machine construction and operation. The 3rd edition of the Standard Handbook of Machine Design will be redesigned to meet the challenges of a new mechanical engineering...

Pro PHP Refactoring
Pro PHP Refactoring

Many businesses and organizations depend on older high-value PHP software that risks abandonment because it is impossible to maintain. The reasons for this may be that the software is not well designed; there is only one developer (the one who created the system) who can develop it because he didn’t use common design patterns and...

LEGO MINDSTORMS NXT-G Programming Guide, Second Edition (Practical Projects)
LEGO MINDSTORMS NXT-G Programming Guide, Second Edition (Practical Projects)

James Kelly’s LEGO MINDSTORMS NXT-G Programming Guide, Second Edition is a fountain of wisdom and ideas for those looking to master the art of programming LEGO’s MINDSTORMS NXT robotics kits. This second edition is fully-updated to cover all the latest features and parts in the NXT 2.0 series. It also...

Oracle Fusion Developer Guide: Building Rich Internet Applications with Oracle ADF Business Components and Oracle ADF Faces
Oracle Fusion Developer Guide: Building Rich Internet Applications with Oracle ADF Business Components and Oracle ADF Faces

Rich Internet Applications (RIA), or to put it into its broader scope, the Rich Enterprise Application (REA) paradigm, has become reality and new business applications are primarily built for web and mobile clients and less for the desktop. Through the adoption of Service Oriented Architecture (SOA) in business application development and...

Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)

A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac...

Mastering Joomla! 1.5 Extension and Framework Development
Mastering Joomla! 1.5 Extension and Framework Development

Joomla! is one of the world's top open source content management systems, which enables you to build websites and powerful online applications. Out of the box, Joomla! does a great job of managing the content needed to enhance the functionality of your website. But for many people, the true power of Joomla! lies in its application...

Dr.Riemann's Zeros
Dr.Riemann's Zeros

In 1859 Bernhard Riemann, a shy German mathematician, wrote an eight-page article, suggesting an answer to a problem that had long puzzled mathematicians. For the next 150 years, the world's mathematicians have longed to confirm the Riemann hypothesis. So great is the interest in its solution that in 2001, an American foundation offered a...

Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy