Home | Amazing | Today | Tags | Publishers | Years | Search 
How Digital Photography Works (2nd Edition)
How Digital Photography Works (2nd Edition)
A full-color, illustrated adventure into the high-tech wonders inside your digital camera by the author/illustrator team that created the bestselling How Computers Work.

 

With clear and simple explanations that say, “You, too, can understand this,” and brilliant,...

Patterns for Parallel Programming (Software Patterns Series)
Patterns for Parallel Programming (Software Patterns Series)

The Parallel Programming Guide for Every Software Developer

From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the...

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Resolving Ethical Dilemmas: A Guide for Clinicians
Resolving Ethical Dilemmas: A Guide for Clinicians
Every day clinicians face ethical dilemmas, many of which result from medical advances and challenges in managed care. How practitioners resolve these challenges has a direct impact on patient care. This timely Third Edition will keep you up to date on a wide range of ethical dilemmas and new ways of thinking about them. Highlights of this edition...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle is a complete, hands-on guide for instructors learning how to use Moodle, the popular course management system (CMS) that enables remote web-based learning and supplements traditional classroom learning. Updated for the latest version, this new edition explains exactly how Moodle works by offering plenty of examples,...
FreeBSD Unleashed (With CD-ROM)
FreeBSD Unleashed (With CD-ROM)
Did you know that the special effects used in The Matrix were rendered using the FreeBSD system? Yahoo and the Internet Movie Database are also powered by FreeBSD. Now you can learn how to use FreeBSD to its full potential as well! FreeBSD Unleashed is a complete reference guide for FreeBSD administrators, developers, webmasters...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Advances in Electronic Business, Volume I
Advances in Electronic Business, Volume I

Advances in Electronic Business, Volume 1 advances the understanding of management methods, information technology, and their joint applications in business processes. The applications of electronic commerce draw great attention from practitioners in applying digital technologies to the buy-and-sell activities. This first volume...

Strategies for Managing Is/It Personnel
Strategies for Managing Is/It Personnel

As IT staff shortages are being experienced worldwide, with a huge gap between the number of positions available for IS/IT workers and the number of available qualified workers to fill them. The major factors that have contributed to the IS/IT crisis include lack of understanding of the career orientations of IS personnel; high IS staff...

Windows Media 9 Series by Example
Windows Media 9 Series by Example
Videographers can harness the potential that WM9 offers to deliver high-quality video and multimedia via DVD and over the Internet. Illustrated examples and tutorials demonstrate the basic functionality of WM9 as well as the options available to advanced users who wish to design new applications with the software development kit. Professional...
Microsoft Office Access 2003 Professional Results
Microsoft Office Access 2003 Professional Results
Become more productive right away using the hands-on directions and targeted information in this innovative how-to reference. Loaded with to-the-point techniques, this complete resource provides insightful answers to common questions as quickly as you can turn its pages. Use Access as a key data management tool. Design databases and program...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy