Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
From Writing to Computers
From Writing to Computers
... the broad and clear analysis of writing and language, and of automata theory, formal logic, and computability theory he uses to reach [his conclusion] is well worth reading.
–H. D. Warner, Western New England College

From Writing to Computers takes as its central theme the issue of a
...
Real-Life X-Files: Investigating the Paranormal
Real-Life X-Files: Investigating the Paranormal
"Whoever said that the truth is both stranger and more entertaining than fiction describes this book exactly." -- Skeptical Inquirer

Interest in the paranormal is at an all-time high. Ghosts, UFOs, psychic power and other unexplained phenomena are endlessly fascinating for us. People often seem to accept of
...
Oracle8i Internal Services for Waits, Latches, Locks, and Memory
Oracle8i Internal Services for Waits, Latches, Locks, and Memory
This concise book contains detailed information about Oracle internals -- information that's not readily available to Oracle customers. It lays a foundation for advanced performance tuning of the Oracle database. Based on Oracle8i release 8.1, the book describes many of the secrets of Oracle's internal services: data structures, algorithms, and...
Fashion Marketing
Fashion Marketing
‘Clothing that is not purchased or worn is not fashion’ (to paraphrase Armani)

Knowledge of marketing is essential to help ensure success and reduce the risk of failure in fashion. For the designer starting up in business, this book offers a guide to the major decisions that will enable you to fulfil...

Fuel Cell Engines
Fuel Cell Engines

The first fuel cell theory and application resource written for students and professionals.

With the field of fuel cells growing at a rapid pace, there is a powerful need for a single guide to the myriad disciplines related to the technology. Fuel Cell Engines provides a comprehensive and detailed introduction to the
...

Forensic Art (Crime Scene Investigations)
Forensic Art (Crime Scene Investigations)

The popularity of crime scene and investigative crime shows on television has come as a surprise to many who work in the field. The main surprise is the concept that crime scene analysts are the true crime solvers, when in truth, it takes dozens of people, doing many different jobs, to solve a crime. Often, the crime scene analyst’s...

Designing with Progressive Enhancement: Building the Web that Works for Everyone
Designing with Progressive Enhancement: Building the Web that Works for Everyone

Progressive enhancement is an approach to web development that aims to deliver the best possible experience to the widest possible audience, and simplifies coding and testing as well. Whether users are viewing your sites on an iPhone, the latest and greatest high-end system, or even hearing them on a screen-reader, their experience should be...

Visual Basic Game Programming for Teens
Visual Basic Game Programming for Teens

Visual Basic Game Programming for Teens, Third Edition teaches teens and other beginners how to create their own 2D role-playing game (RPG) using the free to download and easy to use Visual Basic 2008 Express. The game is built step-by-step throughout the book as readers learn new skills and build upon them. This new edition features almost...

Pro CSS for High Traffic Websites
Pro CSS for High Traffic Websites

Although web standards-based websites can scale effectively—and basic CSS will give you basic results—there are considerations and obstacles that high traffic websites must face to keep your development and hosting costs to a minimum. There are many tips and tricks, as well as down-to-earth best practice information, to make sure...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Machine Learning in Action
Machine Learning in Action

After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on...

unlimited object storage image
Result Page: 866 865 864 863 862 861 860 859 858 857 856 855 854 853 852 851 850 849 848 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy