Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Explore the new design discipline that is behind such products as the iPod and innovative Web sites like Flicer. While other books on this subject are either aimed at more seasoned practitioners or else are too focused on a particular medium like software, this guide will take a more holistic approach to the discipline, looking at interaction...
Enterprise Resource Planning: Global Opportunities and Challenges
Enterprise Resource Planning: Global Opportunities and Challenges
How can ERP be used to improve the overall organizational operating efficiency and effectiveness? How is ERP going to evolve in the future and what are the implications for Electronic commerce? The overall objective of Enterprise Resource Planning: Global Opportunities and Challenges is to provide students, academicians and practitioners interested...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

QoS and QoE Management in UMTS Cellular Systems
QoS and QoE Management in UMTS Cellular Systems
This comprehensive volume provides state-of-the art guidance on Quality of Service (QoS) and Quality of end-user Experience (QoE) management in UMTS cellular systems, tackling planning, provisioning, monitoring and optimisation issues in a single accessible resource. In addition, a detailed discussion is provided on service applications, QoS...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Synthetic Metal Containing Polymers
Synthetic Metal Containing Polymers
The development of the field of synthetic metal-containing polymers - where metal atoms form an integral part of the main chain or side group structure of a polymer - aims to create new materials which combine the processability of organic polymers with the physical or chemical characteristics associated with the metallic element or complex. This...
About Face 3: The Essentials of Interaction Design
About Face 3: The Essentials of Interaction Design
When the first edition of About Face was published in 1995, the idea of designing products based on human goals was a revolutionary concept. Thanks to the work of Alan Cooper and other pioneers, interaction design is now widely recognized as a unique and vital discipline, but our work is far from finished.

This completely updated volume...

Software Testing and Analysis: Process, Principles and Techniques
Software Testing and Analysis: Process, Principles and Techniques
The first comprehensive book on software test and analysis

You can't “test quality into” a software product, but neither can you build a quality software product without test and analysis.  Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in...

Multimedia Data Mining and Knowledge Discovery
Multimedia Data Mining and Knowledge Discovery
Multimedia information is ubiquitous and essential in many applications, and repositories of multimedia are numerous and extremely large. Consequently, researchers and professionals need new techniques and tools for extracting the hidden, useful knowledge embedded within multimedia collections, thereby helping them discover relationships between...
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication
"Building networks with high performance demanded by today's applications requires a complete understanding of the basic principles and latest techniques. This book is the definitive guide to both."-Lyman Chapin

High-speed networking is the essential enabler of modern sophisticated distributed computing applications. This
...
Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Pesticides: A Toxic Time Bomb in Our Midst
Pesticides: A Toxic Time Bomb in Our Midst
The writing of this book came about through a serendipitous circumstance. I wrote a book dealing with child labor in the United States, published three years earlier, containing a chapter that included a description of the hazards migrant farmworkers and their children face, not the least of which was exposure to pesticides. While mentioning the...
unlimited object storage image
Result Page: 598 597 596 595 594 593 592 591 590 589 588 587 586 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy