Home | Amazing | Today | Tags | Publishers | Years | Search 
How to Research
How to Research
"...an immensely useful resource." - Nursing Times Research "As a graduate research student, I have come across a number of books claiming to inform the reader 'how to research', and have become sceptical...This book challenges that scepticism and is to be warmly welcomed." - Research Policy and Planning." "...an...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Principles of Biochemical Toxicology, Fourth Edition
Principles of Biochemical Toxicology, Fourth Edition
This leading textbook in the field examines the mechanisms underlying toxicity, particularly the events at the molecular level and the factors that determine and affect toxicity. The new edition is updated to reflect the latest research into the biochemical basis of toxicology and the growing concerns over the adverse effects of drugs,...
Smart Structures: Innovative Systems for Seismic Response Control
Smart Structures: Innovative Systems for Seismic Response Control
An innovative concept, smart structural systems have proven to be extremely effective in absorbing damaging energy and/or counteracting potentially devastating force, thus limiting structural collapse and subsequent injury. As this technology rapidly evolves, there is an ever-increasing need for an authoritative reference that will allow those in...
The Autobiography of Malcolm X: As Told to Alex Haley
The Autobiography of Malcolm X: As Told to Alex Haley
Malcolm X's searing memoir belongs on the small shelf of great autobiographies. The reasons are many: the blistering honesty with which he recounts his transformation from a bitter, self-destructive petty criminal into an articulate political activist, the continued relevance of his militant analysis of white racism, and his emphasis on...
Home Networking Demystified
Home Networking Demystified
No need to be intimidated by home networking! With a very readable and easy to understand writing style, this book takes the anxiety out of learning how to build or expand a home network. Read a home networking book organised like a fun and painless self-teaching guide. Use the 8-page, 2-colour visual instruction insert to see how to set up a home...
SQL for Microsoft Access, Second Edition (Wordware Applications Library)
SQL for Microsoft Access, Second Edition (Wordware Applications Library)
SQL for Microsoft Access, Second Edition provides a guide to getting the most out of Microsoft Access through the use of Structured Query Language. Step-by-step examples demonstrate how to use SQL script to create tables, add records to tables, and retrieve and manage records. Readers will also learn about calculated fields, Access projects, and...
Probability for Electrical and Computer Engineers
Probability for Electrical and Computer Engineers
About ten years ago we had the idea to begin a course in probability for students of electrical engineering. Prior to that electrical engineering graduate students at the Naval Postgraduate School specializing in communication, control, and signal processing were given a basic course in probability in another department and then began a course in...
Video Codec Design: Developing Image and Video Compression Systems
Video Codec Design: Developing Image and Video Compression Systems
Video compression coding is the enabling technology behind a new wave of communication applications. From streaming internet video to broadcast digital television and digital cinema, the video codec is a key building block for a host of new multimedia applications and services. Video Codec Design sets out to de-mystify the subject of video...
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...

Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
3D Game Programming for Teens
3D Game Programming for Teens
"3D Game Programming for Teens" is a comprehensive, step-by-step introduction to 3D game programming for both teenagers and non-programmers. Organized into three parts, the book begins with an introduction to the game development industry, the game development process, and game engines including WildTangent. Part two covers JavaScript and...
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy