Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Legendary Artists and the Clothes They Wore
Legendary Artists and the Clothes They Wore

Whether it’s Cecil Beaton’s flamboyant, classically tailored suits, Frida Kahlo’s love of bright color, or Cindy Sherman’s penchant for minimalism, an artist’s attire often reflects the creative and spiritual essence of his or her work. In Legendary Artists and the Clothes They Wore, fashion...

C# 2012 for Programmers (5th Edition) (Deitel Developer Series)
C# 2012 for Programmers (5th Edition) (Deitel Developer Series)
Welcome to Visual C#® 2012 and the world of Microsoft® Windows® and Internet and web programming with Microsoft’s .NET platform. Please read the book’s back cover and inside back cover—these concisely capture the book’s essence. In this Preface we provide more details.

We focus on
...
C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Information Retrieval: Data Structures and Algorithms
Information Retrieval: Data Structures and Algorithms

Information retrieval is a sub-field of computer science that deals with the automated storage and retrieval of documents. Providing the latest information retrieval techniques, this guide discusses Information Retrieval data structures and algorithms, including implementations in C. Aimed at software engineers building systems with...

C+ + for Programmers (Deitel Developer Series)
C+ + for Programmers (Deitel Developer Series)
The professional programmer’s DEITEL® guide to C++ and object-oriented application development

Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores the C++ language and C++ Standard
...
Fundamentals of Speaker Recognition
Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J. Watson Research Center in December of 1990, one of the interviewers asked me why, being a mechanical engineer, I was applying for a position in that group. Well, he was an electrical engineer and somehow was under the impression that handwriting...
Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

Visual Basic .NET Power Tools
Visual Basic .NET Power Tools

We can ask heretical questions such as why OOP should be used in all programming situations as many of its proponents insist. We can question the wisdom of allowing C programmers to write the narratives and code examples for the Help system in VB.NET. We can wonder why structures are included in VB.NET if OOP experts insist that you should...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Advanced Nutrition and Human Metabolism
Advanced Nutrition and Human Metabolism

Current, comprehensive, and designed to maximize clarity of the concepts you need to know, longtime best seller ADVANCED NUTRITION AND HUMAN METABOLISM, SIXTH EDITION delivers its signature quality content in a student-friendly presentation. This text is accessible, with relevant examples, illustrations, applications, tables, and figures to...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves

This is the story of a few human genes and how we discovered what these genes do. We each have around 25,000 genes, but the genes in this story are those that vary the most from person to person. These genes--called compatibility genes--are, in effect, a molecular signature that distinguishes each of us as individuals. Davis tells the...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy