Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Architecture with XML: A Management Strategy
Information Architecture with XML: A Management Strategy
In the ‘good old days’ before food labelling, sell-by dates and competitive brand promotion,
you placed yourself at the mercy of your local village store manager. After the
painful wait for the previous customer to bid his farewells and finally let attention turn
your way, you placed your trust in the nice old guy who
...
Open Source Development with CVS
Open Source Development with CVS
The need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.

The best available compromise is the concurrent versioning system...

Degunking Microsoft Office
Degunking Microsoft Office
Degunking Microsoft Office covers the basics to help you quickly get your PCs back to top performance. The unique thing about Degunking Microsoft Office is that it's organized according to the special "cleaning" process that will improve the performance of your computer. Shortcut and time calculation charts are provided...
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
Complete, do-it-yourself robotics projects!

SMART 'BOTS!

* Artificial vision system that uses a CCD camera to track and follow brightly colored objects
* Bi-pedal robots that walk upright
* Functional robotic arm
* Easily programmed behavior-based robots
* Complete parts
...
Creating and Consuming Web Services in Visual Basic
Creating and Consuming Web Services in Visual Basic
One of the more confusing items about Web Services regards defining exactly what and
why they are. Let's begin with why they exist.

Web Services exist to make it easier to integrate applications. Existing technologies include
Java RMI, CORBA, and DCOM. All of these technologies work over networked
environments and allow
...
Fundamentals of Speech Recognition
Fundamentals of Speech Recognition

Provides a theoretically sound, technically accurate, and complete description of the basic knowledge and ideas that constitute a modern system for speech recognition by machine. Covers production, perception, and acoustic-phonetic characterization of the speech signal; signal processing and analysis...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Implementing Service Quality in IP Networks
Implementing Service Quality in IP Networks

Why implement service quality? Is it possible to ensure reliable service quality in multi-service IP networks? Which technologies help in making end-to-end quality of service a realistic business proposition?

In Implementing Service Quality in IP Networks, Vilho Räisänen answers these questions and more. The author...

A+ Certification Study Guide, Fifth Edition (Certification Press)
A+ Certification Study Guide, Fifth Edition (Certification Press)
Get the book that shows you not only what--but how--to study
  • 100% complete coverage of all official objectives for the A+ Core Hardware and Operating System Technologies exams
  • Exam Readiness checklist at the front of the book--you're ready for the exam when...
RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs is the de facto standard PC hardware tome used by more PC professionals and hobbyists than any other book of its kind - selling more than 2.1 million copies in it's 13-edition history. In the 13th Edition, Scott has pulled out all of the stops, adding hundreds of page of new material, two hours of all new video and more...
Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
unlimited object storage image
Result Page: 665 664 663 662 661 660 659 658 657 656 655 654 653 652 651 650 649 648 647 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy