Home | Amazing | Today | Tags | Publishers | Years | Search 
AdvancED DOM Scripting: Dynamic Web Design Techniques
AdvancED DOM Scripting: Dynamic Web Design Techniques
Document Object Model (DOM) scripting is often misrepresented as any sort of scripting on the Web, but pure DOM scripting includes only those features and methods incorporated into a W3C DOM specification—that means no proprietary browser features. In a perfect world, we could follow the standards, ignore proprietary features, and finish with...
Supervisory Control of Concurrent Systems: A Petri Net Structural Approach (Systems & Control: Foundations & Applications)
Supervisory Control of Concurrent Systems: A Petri Net Structural Approach (Systems & Control: Foundations & Applications)
Increasing complexity in engineering projects raises difficult challenges in industry and requires effective tools for correct-by-construction design or design verification. This book addresses the design of such tools for correct-by-construction synthesis of supervisors for systems and specifications represented in the discrete-event framework....
IP over WDM: Building the Next Generation Optical Internet
IP over WDM: Building the Next Generation Optical Internet
The primary objective of this book is to provide, in an understandable style, comprehensive and practical information on the transport of the Internet protocol (IP) over the optical/wavelength-division-multiplexed (WDM) layer. This is accomplished by providing sufficient background information on the enabling technologies, followed by an in-depth...
Exploring C for Microcontrollers: A Hands on Approach
Exploring C for Microcontrollers: A Hands on Approach
The market is flooded with numbers of good books on Embedded Systems designed especially with the most popular MCS51 family. These books are traditional in nature i.e. they start with the routine architectural features of 8051, description of registers, ports, interrupts etc. Most of these things are already covered in the device data sheet and...
IS-IS: Deployment in IP Networks
IS-IS: Deployment in IP Networks

IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol...

Global Specification and Validation of Embedded Systems: Integrating Heterogeneous Components
Global Specification and Validation of Embedded Systems: Integrating Heterogeneous Components
Global modelling and validation is required to master the design of systems made of heterogeneous components. These systems are now omnipresent in our life, and they may be found in several domains such as communications (ex. mobile terminals, optical switches), health (e.g. cardiac stimulators, cochlear implants), transportation (ex. automotive...
Eye Tracking Methodology: Theory and Practice
Eye Tracking Methodology: Theory and Practice
Despite the availability of cheap, fast, accurate and usable eye trackers, there is still little information available on how to develop, implement and use these systems. This second edition of Andrew Duchowski’s successful guide to these systems contains significant additional material on the topic and fills this gap in the market with this...
Flesh Wounds: The Culture of Cosmetic Surgery
Flesh Wounds: The Culture of Cosmetic Surgery
"An impressive book. An important book."--Jamie Lee Curtis

"I blame mirrors. If it weren't for them we wouldn't need plastic surgeons. In the meantime, anyone tempted to re-shape face, body and mind by means of knife should first read Blum's intelligent, persuasive and absorbing book. Both enticed and alarmed, the reader
...
IPTV and Internet Video: Expanding the Reach of Television Broadcasting (NAB Executive Technology Briefings)
IPTV and Internet Video: Expanding the Reach of Television Broadcasting (NAB Executive Technology Briefings)
IPTV and Internet Video clearly explains and demystifies the functions, markets, and future impact of this exploding technology. This book contains an overview of hardware, software, and Internet technologies, case studies, and covers a range of products and services. It is a guide to help leaders master the key trends and drivers transforming the...
Graph -Theoretic Techniques for Web Content Mining (Machine Perception and Artificial Intelligence)
Graph -Theoretic Techniques for Web Content Mining (Machine Perception and Artificial Intelligence)
Graphs are mathematical constructs for representing objects or systems which contain structural (i.e. relationship) information. Graphs have been used in many domains, from software engineering to artificial intelligence. However, the use of graphs in machine learning has been limited, compared to the more prevalent vector model which does not...
SOA in Practice: The Art of Distributed System Design (Theory in Practice)
SOA in Practice: The Art of Distributed System Design (Theory in Practice)
This book demonstrates service-oriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling out a SOA at a major corporation, SOA in Practice explains how SOA can simplify the creation and maintenance of large-scale applications. Whether your...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Result Page: 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy