Home | Amazing | Today | Tags | Publishers | Years | Search 
C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
New Photonics Technologies For The Information Age: The Dream Of Ubitquitous Services (Artech House Optoelectronics Library)
New Photonics Technologies For The Information Age: The Dream Of Ubitquitous Services (Artech House Optoelectronics Library)
This far-reaching resource gives you an in-depth look at the technological developments fueling the drive to the realization of ubiquitous IT services. Based on groundbreaking papers presented at the International Symposium on New Frontiers for Ubiquitous IT Services, the book describes a wide range of state-of-the-art engineering advances in...
Projects in Computing and Information Systems: A Student's Guide
Projects in Computing and Information Systems: A Student's Guide
Undertaking a project is a key component of nearly all computing/information systems degree programmes at both undergraduate and postgraduate levels. Projects in Computing and Information Systems covers the four key aspects of project work (planning, conducting, presenting and taking the project further) in chronological fashion, and...
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
The Best Fully Integrated Study System Available for Exam LPI 199

With hundreds of practice questions and hands-on exercises, Ubuntu Certified Professional Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of all official...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Cosmology
Cosmology
This book is unique in the detailed, self-contained, and comprehensive treatment that it gives to the ideas and formulas that are used and tested in modern cosmological research. It divides into two parts, each of which provides enough material for a one-semester graduate course. The first part deals chiefly with the isotropic and homogeneous...
Phishing: Cutting the Identity Theft Line
Phishing: Cutting the Identity Theft Line
Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions,...

Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
The book reflects the state of the art in important areas of speech and audio signal processing. It presents topics which are missed so far and most recent findings in the field. Leading international experts report on their field of work and their new results.

Considerable amount of space is covered by multi-microphone systems, specific...

SAS 9.1.3 Intelligence Platform: Web Application Administration Guide, Third Edition
SAS 9.1.3 Intelligence Platform: Web Application Administration Guide, Third Edition
Explains how to administer the SAS Web applications that run in the middle tier of the SAS Intelligence Platform. The Web applications include the SAS Information Delivery Portal, SAS Web Report Studio, and SAS Web OLAP Viewer for Java.This guide describes the middle-tier environment, provides sample deployment scenarios, and explains how to...
Studying for Science: A guide to information, communication and study techniques
Studying for Science: A guide to information, communication and study techniques
The book has a wealth of advice, techniques, procedures, and information in it. - Education in Chemistry

a valuable aid to students - Teaching Science

This is a user-friendly guide for the science student to the location and use of the various forms of scientific
...
The Object-Oriented Thought Process (3rd Edition) (Developer's Library)
The Object-Oriented Thought Process (3rd Edition) (Developer's Library)
The Object-Oriented Thought Process is a concise and readable primer. Matt Weisfeld's years of programming, teaching, and writing have given him a flair for presenting highly technical topics in a clear and interesting manner. He is able to blend abstract concepts with ingenious examples and clear illustrations to quickly teach powerful OOP...
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy