Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Marine Polysaccharides: Food Applications
Marine Polysaccharides: Food Applications

Increased public awareness of the importance of healthy living presents new challenges for the commercial food processing sector. The industry is always on the hunt for novel and safe additives with functional properties that can be used to impart healthy and appealing properties to foods. While the ocean is known as a conventional source of...

Video Systems in an IT Environment: The Essentials of Professional Networked Media
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
Safer Surgery
Safer Surgery

Operating theatres are very private workplaces. There have been few research investigations into how highly trained doctors and nurses work together to achieve safe and efficient anaesthesia and surgery. While there have been major advances in surgical and anaesthetic procedures, there are still significant risks for patients during operations...

Careers in Architecture
Careers in Architecture

Ideal for college students or anyone ready to go back to school, this series explores specific areas of interest and helps job seekers determine which job in that field suits them.

  • Breaks down specific educational requirements and additional training
  • Surveys the salaries and job opportunities to help seekers...
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust

Get to grips with modern software demands by learning the effective uses of Rust's powerful memory safety.

Key Features

  • Learn and improve the sequential performance characteristics of your software
  • Understand the use of operating system processes in a high-scale...
Upgrading and Repairing Networks, Fourth Edition
Upgrading and Repairing Networks, Fourth Edition

Even if you aren't a networking professional, Upgrading and Repairing Networks explains those tough networking concepts in a way that won't make you reach for a bottle of aspirin, starting with the fundamentals and working through more advanced concepts. Now in its fourth edition, this industry classic networking reference gives you real world,...

IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

The Patient's Guide to Preventing Medical Errors
The Patient's Guide to Preventing Medical Errors
It is natural to feel apprehensive when facing a surgical procedure or entering a hospital to receive treatment for a newly diagnosed illness. Although a bit nervous, people assume that they will be safe. That assumption is wrong. A startling report revealed that it is far safer to fly on a commercial airliner than to be a patient in a hospital. In...
Network Security Architectures
Network Security Architectures

Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to...

Core Java™ 2 Volume II - Advanced Features, Seventh Edition
Core Java™ 2 Volume II - Advanced Features, Seventh Edition

Completely revised and up-to-date coverage of

  • Multithreadingincluding the java.util.concurrent library, locks, condition objects, futures, thread pools, thread-safe collections, threads and Swing

  • ...
Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would
...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy