Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Explore the new design discipline that is behind such products as the iPod and innovative Web sites like Flicer. While other books on this subject are either aimed at more seasoned practitioners or else are too focused on a particular medium like software, this guide will take a more holistic approach to the discipline, looking at interaction...
Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
“BRAD HELPED US DEVELOP THE TOOLS TO PICK A-PLAYER LEADERS AT GE.” —JACK WELCH


Great companies, large and small, rise or fall because of their talent; the more high performers on your team, the more successful your organization will be. Of course, that’s easier said than done. Research
...
Materials that Change Color: Smart Materials, Intelligent Design
Materials that Change Color: Smart Materials, Intelligent Design

This book presents a design-driven investigation into smart materials developed by chemists, physicists, materials and chemical engineers, and applied by designers to consumer products. Introducing a class of smart materials, that change colors, the book presents their characteristics, advantages, potentialities and difficulties of...

New Photonics Technologies For The Information Age: The Dream Of Ubitquitous Services (Artech House Optoelectronics Library)
New Photonics Technologies For The Information Age: The Dream Of Ubitquitous Services (Artech House Optoelectronics Library)
This far-reaching resource gives you an in-depth look at the technological developments fueling the drive to the realization of ubiquitous IT services. Based on groundbreaking papers presented at the International Symposium on New Frontiers for Ubiquitous IT Services, the book describes a wide range of state-of-the-art engineering advances in...
Home Theater For Dummies (Computer/Tech)
Home Theater For Dummies (Computer/Tech)

Overwhelmed with big screen TV and home theater audio options? What do you need to build the perfect home theater experience? Home Theater For Dummies, 3rd Edition shows you how to plan a home theater system and choose components that fit your budget and your room.

Beginning with the most basic information, this guide...

iPhone SDK Programming, A Beginner's Guide
iPhone SDK Programming, A Beginner's Guide
Develop your own iPhone applications

Ideal for non-Mac programmers, this introductory guide shows developers how to create applications for the world's most popular smart phone. You will learn how to use a modified version of the Mac development environment, the Objective-C programming...

The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Frommer's Sweden (Frommer's Complete Guides)
Frommer's Sweden (Frommer's Complete Guides)

You'll never fall into the tourist traps when you travel with Frommer's. It's like having a friend show you around, taking you to the places locals like best. Our expert authors have already gone everywhere you might go -- they've done the legwork for you, and they're not afraid to tell it like it is, saving you time and...

Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras

Build, scale, and deploy deep neural network models using the star libraries in Python

Key Features

  • Delve into advanced machine learning and deep learning use cases using Tensorflow and Keras
  • Build, deploy, and scale end-to-end deep neural network models in a production...
Turn eBay Data into Dollars
Turn eBay Data into Dollars
You already have the answer to boosting your eBay sales and profits...

You just have to know where to look. Turn eBay Data into Dollars shows you how to use the powerful tools available on eBay to sell smarter and make more money on every sale. Learn to mine sales data from tools such as Andale Research Tools, Terapeak, and...

Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy