Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Evaluation of Novel Approaches to Software Engineering: 3rd and 4th International Conference
Evaluation of Novel Approaches to Software Engineering: 3rd and 4th International Conference

This book is a peer-reviewed collection of papers, modified and extended for the purpose of this publication, but originally presented at the International Conference on Evaluation of Novel Approaches to Software Engineering 2008 and 2009 (ENASE 2008 / 2009). The book’s content is placed within the entire framework of software...

HTML5 Hacks
HTML5 Hacks
HTML5 is the new catchall term for “the Web.” Like Ajax and Web 2.0 before, the term can cause confusion when used in different contexts. HTML5 is technically the fifth revision of the HTML markup language, but you will find the term being used to describe an umbrella of next-generation web technology...
The IOMA Handbook of Logistics and Inventory Management
The IOMA Handbook of Logistics and Inventory Management
Practical, easy-to-implement advice on the most successful logistics management techniques being used today--from selecting the best carriers, setting logistics performance goals, and planning logistics strategies, to streamlining shipping and receiving and slashing logistics costs, and negotiating and managing third party logistics service...
Protocols for Micropropagation of Woody Trees and Fruits
Protocols for Micropropagation of Woody Trees and Fruits

Micropropagation has become a reliable and routine approach for large-scale rapid plant multiplication, which is based on plant cell, tissue and organ culture on well defined tissue culture media under aseptic conditions. A lot of research efforts are being made to develop and refine micropropagation methods and culture media for large-scale...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

The Kock Pouch
The Kock Pouch

This book is about the recently revived technique of Kock pouch in inflammatory bowel disease. It discusses the Kock pouch as an alternative to patients not suitable for a pelvic pouch or where the pelvic pouch has failed. It provides clinicians with all the necessary information on patient guidance and surgical revisions after a...

Essential .NET, Volume I: The Common Language Runtime
Essential .NET, Volume I: The Common Language Runtime

"Don taught me stuff I didn't know about my own product! And I bet he'll teach you something, too."
—From the Foreword by James Miller, Lead Program Manager, Common Language Runtime, Microsoft Corporation

Essential .NET, Volume 1, provides everything developers need to take full...

Organizational Behavior: Securing Competitive Advantage
Organizational Behavior: Securing Competitive Advantage

In today’s business environment, competition arises when other organizations seek to do what your company does, only better. Advantage is gained when you can do something your competitors find difficult to duplicate. Competitive advantage is further secured when competitors cannot duplicate your company’s special ability at all.

...
Wireless Mobility: The Why of Wireless (Networking Professional's Library)
Wireless Mobility: The Why of Wireless (Networking Professional's Library)

Comprehensive Answers to the "Why" of Wireless Mobility

In this unique guide, Cisco wireless expert Neil Reid incorporates best practices from some of the most complex and challenging wireless deployments in the industry and provides an insider's view of the "why" of wireless mobility. The book discusses...

Understanding AJAX: Using JavaScript to Create Rich Internet Applications
Understanding AJAX: Using JavaScript to Create Rich Internet Applications

AJAX: fast mastery for experienced Web developers!

 

Already an experienced Web developer? Apply your skills in today’s fastest-growing area of Web development: AJAX!

 

...
Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

Dictionary of Video & Television Technology (Demystifying Technology Series)
Dictionary of Video & Television Technology (Demystifying Technology Series)

This up-to-date reference is the most complete dictionary covering this fast-paced field. It contains virtually all the terminology commonly used in modern global video and television technology, with thorough definitions aimed at the engineering level. It covers all international video standards, digital and analog video signals, data...

unlimited object storage image
Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy