Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications
Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications
Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology & Automation, Telecommunications and Networking....
Real-Time Communication with WebRTC: Peer-to-Peer in the Browser
Real-Time Communication with WebRTC: Peer-to-Peer in the Browser

Deliver rich audio and video real-time communication and peer-to-peer data exchange right in the browser, without the need for proprietary plug-ins. This concise hands-on guide shows you how to use the emerging Web Real-Time Communication (WebRTC) technology to build a browser-to-browser application, piece by piece.

The...

Photoshop Elements 5: The Missing Manual
Photoshop Elements 5: The Missing Manual

Anyone still think that Adobe Photoshop Elements is a toy version of the real thing? As the most popular photo-editing program on the market, Photoshop Elements not only has Photoshop's marvelous powers, but also has capabilities the mothership lacks. Each new version includes more tools designed specifically for today's consumer...

The Business Analyst's Handbook
The Business Analyst's Handbook

The Business Analyst (BA) plays an important role as liaison between business stakeholders and the technical team (software developers, vendors, etc.), ensuring that business needs are reflected in any software solution. Despite the importance of the job, there is currently no book specifically designed as a comprehensive reference manual for...

Applying Enterprise JavaBeans™:Component-Based Development for the J2EE™ Platform, Second Edition
Applying Enterprise JavaBeans™:Component-Based Development for the J2EE™ Platform, Second Edition

Written by the architects of the Enterprise JavaBean (EJB) specification, Applying Enterprise JavaBeans(TM), Second Edition is an advanced programming guide and reference source which has been updated and expanded to reflect updates in the EJB 2.1 specification. This book is an invaluable...

CCSA NG: Check Point Certified Security Administrator Study Guide
CCSA NG: Check Point Certified Security Administrator Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management I NG exam, #156-210. Written by a Check Point security expert who knows exactly what it takes to pass the test, this study guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
Pro Tools for Music Production, Second Edition: Recording, Editing and Mixing
Pro Tools for Music Production, Second Edition: Recording, Editing and Mixing
If you are a music producer, recording engineer, musician, or composer there is definitely something in this book for you. If you are about to purchase new equipment, wish to troubleshoot technical problems, need guidance on how to achieve professional sounding results, or are looking for inspiration for new ideas - keep this book by your side....
Houches Lectures: 1972, Black Holes (Les Houches Lectures : 1972 Lectures)
Houches Lectures: 1972, Black Holes (Les Houches Lectures : 1972 Lectures)
The story of the phenomenal transformation of general relativity within little more than a decade, from a quiet backwater of research, harboring a handful of theorists, to a booming outpost attracting increasing numbers of highly talented young people as well as heavy investment in experiments, is by now familiar. The amazing thing about this...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Frontiers of Evolutionary Computation
Frontiers of Evolutionary Computation
This book is a collection of essays, authored by eminent scholars in evolutionary computation (EC), artificial intelligence (AI), operations research, complexity theory and mathematics. Each essay revolves around important, interesting and unresolved questions in the field of evolutionary computation....
Beginning Java EE 7 (Expert Voice in Java)
Beginning Java EE 7 (Expert Voice in Java)

Java Enterprise Edition (Java EE) continues to be one of the leading Java technologies and platforms. Beginning Java EE 7 is the first tutorial book on Java EE 7.

Step by step and easy to follow, this book describes many of the Java EE 7 specifications and reference implementations, and shows them in action...

Mobile Networks and Management: First International Conference
Mobile Networks and Management: First International Conference

The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13–14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top researchers,...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy