Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Elastomere Friction: Theory, Experiment and Simulation
Elastomere Friction: Theory, Experiment and Simulation

Understanding elastomer friction is essential for the development of tyres, but also for sealings and other components. Thus it is of great technical importance. There are many aspects to modelling frictional processes in which an elastomer is interacting with a rough surface, ranging from theoretical formulations, leading to reduced and...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Writing for Digital Media
Writing for Digital Media
In the digital age, we are all consumers and producers, readers and publishers alike. The Internet has made it possible for anyone to publish his or her writing online almost instantaneously for all the world to read.

The evolution of digital media has introduced both unprecedented challenges and opportunities for
...
Content and Workflow Management for Library Websites: Case Studies
Content and Workflow Management for Library Websites: Case Studies

Using database-driven web pages or web content management (WCM) systems to manage increasingly diverse web content and to streamline workflows is a commonly practiced solution recognized in libraries to-day. However, limited library web content management models and funding constraints prevent many libraries from purchasing commercially...

Developing RESTful Web Services with Jersey 2.0
Developing RESTful Web Services with Jersey 2.0

Learn how to design and implement a test automation framework block by block

Overview

  • A simple and easy demonstration of the important concepts will enable you to translate abstract ideas into practice
  • Each chapter begins with an outline and a brief statement of content to help the reader...
Interactive Project Management: Pixels, People, and Process (Voices That Matter)
Interactive Project Management: Pixels, People, and Process (Voices That Matter)

As an industry, interactive is different. The work entails elements of software development, marketing, and advertising, yet it’s neither purely technical nor traditional “agency” work. Delivery methods are different, and because the industry is relatively new, the gap in understanding between the clients buying the work and...

Enhancing CAD Drawings with Photoshop
Enhancing CAD Drawings with Photoshop
"If you're an architect looking to get the most out of Photoshop, look no further! Enhancing CAD Drawings with Photoshop is a killer book."
George Omura, Author, Mastering AutoCAD 2005 and AutoCAD LT 2005

Bring Your CAD Drawings to Life Using Artistic Photoshop
...
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions shows you how to harness the power of ActionScript 2.0 and make the most of the improved design tools of Flash 8 to create usable, intuitive Flash interfaces.

In this book, you'll find a number of concrete Flash usability solutions that use elements such as navigation menus, data filtering, forms,
...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

XML Schema Essentials
XML Schema Essentials
The definitive how-to guide that will get you quickly up to speed on the practical application of XML Schema!

Replacing XML DTDs (Document Type Definitions) as the way in which XML documents are described and validated, XML Schema allows you to describe the structure of information in an XML document and is essential for ensuring
...
unlimited object storage image
Result Page: 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy