Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nutrition and Well-being a To Z; 2V.
Nutrition and Well-being a To Z; 2V.
Nutrition is one of the most important factors that impact health in all areas of the lifecycle. Pregnant women need adequate food and health care to deliver a healthy baby who has a good birth weight and a fighting chance for survival. In many regions of the world, the infant mortality rate is very high, meaning that many...
Mixed Reality and Human-Robot Interaction (Intelligent Systems, Control and Automation: Science and Engineering)
Mixed Reality and Human-Robot Interaction (Intelligent Systems, Control and Automation: Science and Engineering)

MR technologies play an increasing role in different aspects of human-robot interactions. The visual combination of digital contents with real working spaces creates a simulated environment that is set out to enhance these aspects. This book presents and discusses fundamental scientific issues, technical implementations, lab testing, and...

Adobe Flex 2: Training from the Source
Adobe Flex 2: Training from the Source
Part of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus...
Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
Pragmatic Version Control: Using Subversion (The Pragmatic Starter Kit Series) (2nd Edition)
This book covers the theory behind version control and how it can help developers become more efficient, work better as a team, and keep on top of software complexity. Version control, done well, is your "undo" button for the project: nothing is final, and mistakes are easily rolled back.

This book describes Subversion 1.3, the...

Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

iPhone and iPad Apps Marketing: Secrets to Selling Your iPhone and iPad Apps (2nd Edition) (Que Biz-Tech)
iPhone and iPad Apps Marketing: Secrets to Selling Your iPhone and iPad Apps (2nd Edition) (Que Biz-Tech)

Over the past three years, I have witnessed something

remarkable as iPhone and iPad developers have created and posted apps to Apple’s App Store at a breathtaking pace. The App Store has swelled to more than 400,000 apps and still shows no signs of abating. The gold rush to sell iPhone and
...
Stories that Move Mountains: Storytelling and Visual Design for Persuasive Presentations
Stories that Move Mountains: Storytelling and Visual Design for Persuasive Presentations

Learn how to use stories and visuals to make top–notch presentations

It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success, until now. Developed over a twelve year period as a presentation method to help Enterprise Architects, it was adopted by Microsoft Enterprise...

Carbon Dioxide and Organometallics (Topics in Organometallic Chemistry)
Carbon Dioxide and Organometallics (Topics in Organometallic Chemistry)

The series Topics in Organometallic Chemistry presents critical overviews of research results in organometallic chemistry. As our understanding of organometallic structure, properties and mechanisms increases, new ways are opened for the design of organometallic compounds and reactions tailored to the needs of such diverse areas as organic...

Raspberry Pi 3 Projects for Java Programmers
Raspberry Pi 3 Projects for Java Programmers

Learn the art of building enticing projects by unleashing the potential of Raspberry Pi 3 using Java

About This Book

  • Explore the small yet powerful mini computer in order to run java applications
  • Leverage Java libraries to build exciting projects on home automation, IoT, and Robotics by...
Essential ASP.NET with Examples in Visual Basic .NET
Essential ASP.NET with Examples in Visual Basic .NET

Essential ASP.NET with Examples in Visual Basic .NET is the Visual Basic programmer's definitive reference for ASP.NET through version 1.1. It provides experienced programmers with the information needed to fully understand the technology, and is a clear guide to using ASP.NET to build robust...

unlimited object storage image
Result Page: 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy