Home | Amazing | Today | Tags | Publishers | Years | Search 
HTI+ Exam Cram 2
HTI+ Exam Cram 2

Welcome to the Home Technology Integrator (HTI+) Exam Cram 2! This book is designed to help you prepare to take—and pass—the Computing Technology Industry Association (CompTIA) certification exams HT0-101, "Residential Systems," and HT0-102, "Systems Infrastructure and Integration." This...

Food Chemical Risk Analysis (Food Science & Safety Series)
Food Chemical Risk Analysis (Food Science & Safety Series)

The recognition that chemicals in food, whatever their origin, might present a risk to the consumer has long been recognised. However, early food regulations at the beginning of the century were primarily aimed at prevention of adulteration and fraud rather than directed at consumer safety. It is only in the second half of the century...

Beginning iOS Game Center and Game Kit: For iPhone, iPad, and iPod touch
Beginning iOS Game Center and Game Kit: For iPhone, iPad, and iPod touch

As the iOS platform begins to become more popular, developers are looking for ways to add additional polish and functionality to their software. Game Center and Game Kit provide an easy path for adding advanced functionality to your software with only a fraction of the work in the past.

Beginning iOS Game Center and Game...

HTML5 Mastery: Semantics, Standards, and Styling
HTML5 Mastery: Semantics, Standards, and Styling

Unless you have been off on a digital-free holiday, you’ve heard a lot of chatter about HTML5. As a web professional, it is apparent that having an understanding of HTML5 is not only beneficial—it’s essential. The future of the Web has radically changed course in the last few years from XHTML to HTML5, which means...

Beginning Java 7 (Beginning Apress)
Beginning Java 7 (Beginning Apress)

Welcome to Java. This chapter launches you on a tour of this technology by focusing on fundamentals. First, you receive an answer to the “What is Java?” question. If you have not previously encountered Java, the answer might surprise you. Next, you are introduced to some basic tools that will help you start developing Java...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...

Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment

The Millennium Ecosystem Assessment (MA) was carried out between 2001 and 2005 to assess the consequences of ecosystem change for human well-being and to establish the basis for actions needed to enhance the conservation and sustainable use of ecosystems and their contributions to human well-being. The MA was originally conceived as a...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Programming with POSIX® Threads
Programming with POSIX® Threads

This book is about "threads" and how to use them. Thread" is just a name for a basic software "thing" that can do work on a computer. A thread is smaller, faster, and more maneuverable than a traditional process. In fact, once threads have been added to an operating system, a "process" becomes just...

Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)
Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)

Anticipatory optimization for dynamic decision making relies on a number of different scientific disciplines. On a general level, the foundations of the field may be localized at the intersection of operations research, computer science and decision theory. Closer inspection reveals the important role of branches such as simulation,...

Result Page: 569 568 567 566 565 564 563 562 561 560 559 558 557 556 555 554 553 552 551 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy