Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming for TV, Radio & The Internet, Second Edition: Strategy, Development & Evaluation
Programming for TV, Radio & The Internet, Second Edition: Strategy, Development & Evaluation

Where do program ideas come from? How are concepts developed into saleable productions? Who do you talk to about getting a show produced? How do you schedule shows on the lineup? What do you do if a series is in trouble? The answers to these questions, and many more, can be found in this comprehensive, in-depth look at the roles and...

Fuzzy Logic and Probability Applications: A Practical Guide
Fuzzy Logic and Probability Applications: A Practical Guide

Probability theory and fuzzy logic are the principal components of an array of methodologies for dealing with problems in which uncertainty and imprecision play important roles. In relation to probability theory, fuzzy logic is a new kid on the block. As such, it has been and continues to be, though to a lesser degree, an object of...

Official Adobe Print Publishing Guide, Second Edition: The Essential Resource for Design, Production, and Prepress
Official Adobe Print Publishing Guide, Second Edition: The Essential Resource for Design, Production, and Prepress

Until recently, most prepress tasks—such as scanning color photographs, trapping, imposition, color correction, and halftone screening—were performed exclusively by skilled specialists working manually or on expensive proprietary systems. Today many of these tasks can be accomplished on the desktop.

The...

Microsoft SharePoint 2010 Business Intelligence Unleashed
Microsoft SharePoint 2010 Business Intelligence Unleashed

Business intelligence (BI) has been around for many more years than you might think. Decision support systems (DSS) and executive information systems (EIS) from the 1970s and 1980s, along with artificial intelligence (AI) systems from the 1990s, can now all be considered as part of what BI comprises today.

In brief, BI refers...

MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory
MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory

This training kit is designed for IT professionals who support or plan to support Microsoft Active Directory (AD) on Windows Server 2008 R2 and who also plan to take the Microsoft Certified Technology Specialist (MCTS) 70-640 examination. It is assumed that you have a solid foundation-level understanding of Microsoft Windows...

Developing High Quality Data Models
Developing High Quality Data Models

I would like to start by explaining how I came to write this book, and to acknowledge its influences and the help I have received along the way.

I have been extremely fortunate. I have a wonderful wife and two wonderful grown-up children, and I have had all but thirty years working for Shell, which provided an environment...

IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server v7.0 Security

IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform...

Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)
Focke-Wulf Fw 190 Aces of the Russian Front (Osprey Aircraft of the Aces, No 6)

Of all the fronts fought on by the Jagdflieger during World War 2, the Russian, or Eastern, was easily the most lucrative in terms of targets for the experten. Marry an abundance of targets with the Luftwaffe’s best piston-engined fighter of the war – Focke-Wulf’s Fw 190 ‘Butcher Bird’ – and it quickly...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

The Developer's Code
The Developer's Code

This is a book for developers of all kinds. However, it has

little to do with code. It doesn’t matter if you program in C# or Ruby or Python or PHP or Java or JavaScript or Action- Script. It doesn’t matter whether you’re working on databases, writing server-side code, or scripting the
...
The Handbook of Optical Communication Networks (Electrical Engineering Handbook)
The Handbook of Optical Communication Networks (Electrical Engineering Handbook)

During the last 3 decades, the field of telecommunications has witnessed tremendous growth. Proliferation of the Internet has started a true revolution that is expected to continue through the foreseeable future. Three factors have played major roles in the unprecedented growth of this field:

• Users’ incessant
...

Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy