Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Game Character Development
Game Character Development
The game development industry is in some ways quite similar to the film industry. We create entertainment for the masses, escapism for people as they are taken into different lives, and amazing worlds of imagination and wonder. The outsider’s view of what it must be like to work in these industries is often enjoyed through rose-tinted...
Why You Like It: The Science and Culture of Musical Taste
Why You Like It: The Science and Culture of Musical Taste

From the chief architect of the Pandora Radio’s Music Genome Project comes a definitive and groundbreaking examination of how your mind, body, and upbringing influence the music you love.

Everyone loves music. But what is it that makes music so universally beloved and have such a powerful effect on us?

...
The Most Important Thing: Discovering Truth at the Heart of Life
The Most Important Thing: Discovering Truth at the Heart of Life

From esteemed teacher Adyashanti, a collection of writings on the search for the ultimate reality beneath the narrative of our lives

"Our inner lives are every bit as astonishing, baffling, and mysterious as the infinite vastness of the cosmos." ?Adyashanti

We all define
...

Wireless Receiver Design for Digital Communications
Wireless Receiver Design for Digital Communications
There have been two paradigm shifts since we wrote the first edition of this book. The first major shift is that the world is now full of digital signals. Commercial television and radio have changed from analog to digital formats. Cellular telephone signals are digital, and even video baby monitors transmit digital signals....
Python Descriptors
Python Descriptors
This short book on Python descriptors is a collection of knowledge and ideas from many sources on dealing with and creating descriptors. And, after going through the things all descriptors have in common, the author explores ideas that have multiple ways of being implemented as well as completely new ideas never seen elsewhere before....
Microcomputer Quantum Mechanics
Microcomputer Quantum Mechanics
How sad to learn a language and then to have nothing to say. This is, however, a very common situation in computing. Students learn how to write simple programs, but there is often nothing upon which they can test their new-found skills and no way of building upon their experience by using the computer on real or even realistic problems. Dr...
Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life
Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life

A fascinating exploration of how we interpret and experience emotions-and how we can improve our emotional skills-by a pioneering psychologist

A renowned expert in nonverbal communication, Paul Ekman has led a revolution in our scientific understanding of emotions. Now he assembles his pathbreaking research and
...

Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Systems Analysis and Design with UML
Systems Analysis and Design with UML
Systems Analysis and Design (SAD) is an exciting, active field in which analysts continually learn new techniques and approaches to develop systems more effectively and efficiently. However there is a core set of skills that all analysts need to know—no matter what approach or methodology is used. All information systems...
CrackBerry: True Tales of BlackBerry Use and Abuse (Books for Professionals by Professionals)
CrackBerry: True Tales of BlackBerry Use and Abuse (Books for Professionals by Professionals)

A delayed train, a dip in the conversation, an early morning hour with no sleep—during these moments, do you feel an overwhelming urge to grab your BlackBerry? Do you know someone else who does? If the answer is yes, then look no further than this one-of-a-kind book…

CrackBerry: True Tales of Blackberry Use and...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy