Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart

If you’ve always wanted to learn how to program a computer, or to learn the widely used C++ programming language in particular, C++ Without Fear, Second Edition, offers...

Pediatric Orthopedic Deformities, Volume 2: Developmental Disorders of the Lower Extremity: Hip to Knee to Ankle and Foot
Pediatric Orthopedic Deformities, Volume 2: Developmental Disorders of the Lower Extremity: Hip to Knee to Ankle and Foot

Volume 2 of this comprehensive and state-of-the-art text on pediatric orthopedic deformities focuses on conditions of the lower extremity. Developmental disorders of the hip – developmental dysplasia of the hip (DDH), Legg-Calvé-Perthes disease (LCP), coxa vara including slipped capital femoral epiphysis (SCFE), and...

ASP.NET in a Nutshell, Second Edition
ASP.NET in a Nutshell, Second Edition
Newly updated for Visual Studio .NET 2003, the second edition of this book includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handling, new material on web application development for mobile devices, plus an overview of the class libraries.

ASP.NET is the
...
Managing Power Electronics: VLSI and DSP-Driven Computer Systems
Managing Power Electronics: VLSI and DSP-Driven Computer Systems
This book discusses state-of-the-art power management techniques of
modern electronic appliances relying on such Very Large Scale Integration
(VLSI) chips as CPUs and DSPs.

It also covers specific circuit design issues and their implications,
including original derivation of important expressions.
This book is geared
...
Responsible Management of Information Systems
Responsible Management of Information Systems

This book discusses the question of how information systems can be used and managed in a responsible manner. Normative problems such as intellectual property, privacy, power distribution, etc., are at the heart of many of the problems faced by users and managers of information systems. Responsible Management of Information Systems...

Effective Knowledge Transfer in Multinational Corporations
Effective Knowledge Transfer in Multinational Corporations
Those who have really enabled this research – and will, I hope, also benefit from its outcome at one point or other – are the managers who participated in the study. I hope my lengthy questionnaire and my numerous follow-up calls have not discouraged them to support further empirical studies. Special thanks go to my advisers, Professors...
Dynamic HTML: The Definitive Reference
Dynamic HTML: The Definitive Reference
Danny Goodman felt that he couldn't trust any of the documentation on Dynamic HTML (DHTML) that he read (too many contradictions), so he wrote this book as a reference for working with his own clients. After testing tags and techniques on multiple releases of the main browsers, Goodman came up with very practical information--some of which you may...
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Practical Drug Enforcement, Second Edition (Practical Aspects of Criminal and Forensic Investigations)
Police work deals with human nature, which is always changing and, therefore, constantly poses new challenges for the law enforcement officer. The skills learned in basic police training are just that — basic. Officers must seek continual training to keep up with their criminal counterparts.

The investigation of crimes such as
...
Fuzzy Control Systems
Fuzzy Control Systems
Must reading for anyone interested in acquiring a thorough understanding of fuzzy logic, its role in soft computing, and its application to control and related fields.

-Lotfi A. Zadeh
From the Foreword

Fuzzy Control Systems explores one of the most active areas of research involving fuzzy set theory. The
...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Modern Mathematics in the Light of the Fields Medal
Modern Mathematics in the Light of the Fields Medal
Examines the evolution of certain areas of modern mathematics by recounting the past winners of the international Fields Medal, the - Nobel Prize - of mathematics. Paper. DLC: Mathematics - History 20th century.

This little book is extraordinary in at least three ways. First, it contains in only 150 pages a synopsis of the whole
...
Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

unlimited object storage image
Result Page: 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy