Home | Amazing | Today | Tags | Publishers | Years | Search 
RF & Wireless Technologies (Newnes Know It All)
RF & Wireless Technologies (Newnes Know It All)
RF & wireless technology enables laptops, cell phones, portable video games and much more - engineers can "Know It All with Newnes!"

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key
...
Dynamic Methods for Damage Detection in Structures (CISM International Centre for Mechanical Sciences)
Dynamic Methods for Damage Detection in Structures (CISM International Centre for Mechanical Sciences)
The book presents an updated state-of-the-art overview of dynamic methods for structural health monitoring and damage detection in structures, with special emphasis on advanced research in the field today. The topic is treated as a series of lessons, explaining both theoretical and experimental aspects of dynamic non-destructive methods and their...
CompTIA Security+ Study Guide
CompTIA Security+ Study Guide

Prepare for CompTIA's updated Security+ exam

Validate your professional computer security expertise with certification that helps you stand out in the marketplace. This guide is your key to preparing for CompTIA's new Security+ SY0-201 exam, the first major revision of the exam since it was launched in 2002. Acquire hands-on skills and...

SAS for Data Analysis: Intermediate Statistical Methods (Statistics and Computing)
SAS for Data Analysis: Intermediate Statistical Methods (Statistics and Computing)
This book is intended for use as the textbook in a second course in applied statistics that covers topics in multiple regression and analysis of variance at an intermediate level. Generally, students enrolled in such courses are primarily graduate majors or advanced undergraduate students from a variety of disciplines. These students typically have...
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
BusinessObjects XI Release 2 For Dummies (Computer/Tech)
BusinessObjects XI Release 2 For Dummies (Computer/Tech)

Make better decisions with help from BusinessObjects

Find your way around Universes and see how your organization is doing

BusinessObjects may seem like a dauntingly complex topic, but this book makes it a snap. Even if you're new to business intelligence tools, you'll find it's...

User Interface Design: A Software Engineering Perspective
User Interface Design: A Software Engineering Perspective
When you design the user interface to a computer system, you decide which screens the system will show, what exactly will be in each screen and how it will look. You also decide what the user can click on and what happens when he does so, plus all the other details of the user interface. It is the designer’s responsibility that the system has...
Learning Theory: 20th Annual Conference on Learning Theory, COLT 2007, San Diego, CA, USA, June 13-15, 2007
Learning Theory: 20th Annual Conference on Learning Theory, COLT 2007, San Diego, CA, USA, June 13-15, 2007
This book constitutes the refereed proceedings of the 20th Annual Conference on Learning Theory, COLT 2007, held in San Diego, CA, USA in June 2007.

The 41 revised full papers presented together with 5 articles on open problems and 2 invited lectures were carefully reviewed and selected from a total of 92 submissions. The papers cover a wide...

Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Build Your Own Security Lab: A Field Guide for Network Testing
Build Your Own Security Lab: A Field Guide for Network Testing
Welcome to Build Your Own Security Lab. With this book, you can increase your hands-on IT security skills. The techniques and tools discussed in this book can benefit IT security designers and implementers. IT security designers will benefit as they learn more about specific tools and their capabilities. Implementers will gain firsthand experience...
The Best Damn Windows Server 2008 Book Period, Second Edition
The Best Damn Windows Server 2008 Book Period, Second Edition
In depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to
...
Advanced Electrical Installation Work, Fifth Edition: Level 3 City & Guilds 2330 Technical Certificate & 2356 NVQ
Advanced Electrical Installation Work, Fifth Edition: Level 3 City & Guilds 2330 Technical Certificate & 2356 NVQ
Covers all electrical installation trainees need to know for the Level 3 certificate

Trevor Linsley's textbooks have helped thousands of students to gain their electrical installation qualifications. In a concise and practical way, Advanced Electrical Installation Work supports the City & Guilds 2330
...
Result Page: 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy