Home | Amazing | Today | Tags | Publishers | Years | Search 
Techno Rebels: The Renegades of Electronic Funk (Painted Turtle)
Techno Rebels: The Renegades of Electronic Funk (Painted Turtle)

When it was originally published in 1999, Techno Rebels became the definitive text on a hard-to-define but vital genre of music. Author Dan Sicko demystified techno's characteristics, influences, and origins and argued that although techno enjoyed its most widespread popularity in Europe, its birthplace and most important incubator was...

In the Godfather Garden: The Long Life and Times of Richie "the Boot" Boiardo (Rivergate Regionals Collection)
In the Godfather Garden: The Long Life and Times of Richie "the Boot" Boiardo (Rivergate Regionals Collection)
In the Godfather Garden is the true story of the life of Richie “the Boot” Boiardo, one of the most powerful and feared men in the New Jersey underworld. The Boot cut his teeth battling the Jewish gang lord Abner Longy Zwillman on the streets of Newark during Prohibition and endured to become one of the East Coast’s...
Neuropathology Review
Neuropathology Review

Richard A. Prayson, md, summarizes in outline form for active pathologists and residents in training-as well as those seeking a concise up-to-date overview of the subject -the essential element of the neuropathology curriculum. Topics range from basic information on the spectrum of neurologic-related disease to pertinent pictorial examples of...

Getting Started with Raspberry Pi Zero
Getting Started with Raspberry Pi Zero

Key Features

  • Get started with Raspberry Pi Zero and put all of its exciting features to use
  • Create fun games and programs with little or no programming experience
  • Learn to use this super-tiny PC to control hardware and software for work, play, and everything else

Book...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Lean Auditing: Driving Added Value and Efficiency in Internal Audit
Lean Auditing: Driving Added Value and Efficiency in Internal Audit

"How can you argue with the core principles of Lean, that you focuson what provides value to your customer and eliminate work that isnot necessary (muda)? Internal auditors need to understandnot  only who their primary customers are, but what isvaluable to them - which in most cases is assurance that the risksthat matter to the...

Best Practices in Lean Six Sigma Process Improvement: A Deeper Look
Best Practices in Lean Six Sigma Process Improvement: A Deeper Look

Best Practices in Lean Six Sigma Process Improvement reveals how to refocus lean/six sigma processes on what author Richard Schonberger—world-renowned process improvement pioneer—calls "the Golden Goals": better quality, quicker response, greater flexibility, and higher value. This manual shows you how it can be...

Faith (The Art of Living)
Faith (The Art of Living)

In "Faith", the theologian Theo Hobson explores the notion of faith and the role it plays in our lives. He unpacks the concept to ask whether faith is dependent on religion or whether it is also a general secular phenomenon. In exploring this question Hobson ranges widely over theology, philosophy, politics and psychology and...

Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)
Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications (Operations Research / Computer Science Interfaces Series)

Graph Theory, Combinatorics and Algorithms: Interdisciplinary Applications focuses on discrete mathematics and combinatorial algorithms interacting with real world problems in computer science, operations research, applied mathematics and engineering. The book contains eleven chapters written by...

Advanced Programming in the UNIX Environment, 3rd Edition
Advanced Programming in the UNIX Environment, 3rd Edition

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve...

An Introduction to Quantum Computing Algorithms
An Introduction to Quantum Computing Algorithms
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com­ puter. Since the difficulty of the factoring problem is crucial for the se­ curity of a public key encryption system,...
Modern C++: Efficient and Scalable Application Development: Leverage the modern features of C++ to overcome difficulties in various stages of application development
Modern C++: Efficient and Scalable Application Development: Leverage the modern features of C++ to overcome difficulties in various stages of application development

Create apps in C++ and leverage its latest features using modern programming techniques.

Key Features

  • Develop strong C++ skills to build a variety of applications
  • Explore features of C++17, such as containers, algorithms, and threads
  • Grasp the standard...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy