Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Search Engine Visibility
Search Engine Visibility
Search Engine Visibility is not about merely obtaining top positions in search results. Rather,Search Engine Visibility is about designing, writing and creating a web site primarily for your site's visitors, and helping them find what they are searching via the major search...
Recent Advances in Applied Probability
Recent Advances in Applied Probability
Text databases are becoming larger and larger, the best example being the
World Wide Web (or just Web). For this reason, the importance of the information
retrieval (IR) and related topics such as text mining, is increasing every
day [Baeza-Yates & Ribeiro-Neto, 1999]. However, doing experiments in large
text collections is
...
Logic of Analog and Digital Machines
Logic of Analog and Digital Machines
Computer Science is a very young discipline compared to most others. Alan Turing published the seminal paper of the field in 1936. Around the same time, the militaries in Germany, UK, and US commissioned the first digital electronic computer projects. One of these, the Colossus at Bletchley Park in the UK, was used to break the...
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)

Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard...

DB2 Version 8: The Official Guide
DB2 Version 8: The Official Guide

IBM DB2 Universal Database v8.1.2 will help you access any information, from any application, from anywhere in your organization, anytime—and do it all more easily and cost-effectively than you ever thought possible.

Now, in DB2 Version 8: The Official Guide, a team...

The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel Applications
The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel Applications
If you're looking to take full advantage of multi-core processors with concurrent programming, this practical book provides the knowledge and hands-on experience you need. The Art of Concurrency is one of the few resources to focus on implementing algorithms in the shared-memory model of multi-core processors, rather than just theoretical models or...
FreeBSD Device Drivers: A Guide for the Intrepid
FreeBSD Device Drivers: A Guide for the Intrepid
Welcome to FreeBSD Device Drivers! The goal of this book is to help you improve your understanding of device drivers under FreeBSD. By the time you finish this book, you should be able to build, configure, and manage your own FreeBSD device drivers.

This book covers FreeBSD version 8, the version recommended for production
...
Euthanasia, Abortion, Death Penalty and Religion - The Right to Life and its Limitations: International Empirical Research (Religion and Human Rights, 4)
Euthanasia, Abortion, Death Penalty and Religion - The Right to Life and its Limitations: International Empirical Research (Religion and Human Rights, 4)

This book considers how the termination of life might be accepted in the view of a general obligation to protect life. It features more than 10 papers written by scholars from 14 countries that offer international comparative empirical research. Inside, readers will find case studies from such areas as: India, Chile, Germany, Italy,...

Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms

A good understanding of algorithms, and the knowledge of when to apply them, is crucial to producing software that not only works correctly, but also performs efficiently. This is the only book to impart all this essential information—from the basics of algorithms, data structures, and performance characteristics to...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Xamarin.Forms Solutions
Xamarin.Forms Solutions
Use the solutions provided in this book to handle common challenges in Xamarin.Forms that are encountered on a daily basis. Working examples and techniques are presented that you can modify and drop directly into your own projects. You will be able to deliver working code faster than ever. Examples are made available through GitHub,...
Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy