Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

Optimal Estimation of Dynamic Systems, Second Edition (Chapman & Hall/CRC Applied Mathematics & Nonlinear Science)
Optimal Estimation of Dynamic Systems, Second Edition (Chapman & Hall/CRC Applied Mathematics & Nonlinear Science)

Optimal Estimation of Dynamic Systems, Second Edition highlights the importance of both physical and numerical modeling in solving dynamics-based estimation problems found in engineering systems. Accessible to engineering students, applied mathematicians, and practicing engineers, the text presents the central concepts and...

Designing Social Interfaces: Principles, Patterns, and Practices for Improving the User Experience (Animal Guide)
Designing Social Interfaces: Principles, Patterns, and Practices for Improving the User Experience (Animal Guide)
From the creators of Yahoo!'s Design Pattern Library, Designing Social Interfaces provides you with more than 100 patterns, principles, and best practices, along with salient advice for many of the common challenges you'll face when starting a social website. Designing sites that foster user interaction and community-building is a valuable...
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL
Semantic Web for the Working Ontologist, Second Edition: Effective Modeling in RDFS and OWL

Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been encouraged by the reception the book has received. Practitioners from a wide variety of industries— health care, energy, environmental science, life sciences, national intelligence, and publishing, to name a few—have told...

Handbook of Food Factory Design
Handbook of Food Factory Design

Food manufacturing has evolved over the centuries from kitchen industries to modern, sophisticated production operations. A typical food factory includes the food processing and packaging lines, the buildings and exterior landscaping, and the utility-supply and waste-treatment facilities. As a single individual is unlikely to possess all the...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Fuzzy Logic and Intelligent Systems (International Series in Intelligent Technologies)
Fuzzy Logic and Intelligent Systems (International Series in Intelligent Technologies)
One of the attractions of fuzzy logic is its utility in solving many real engineering problems. As many have realised, the major obstacles in building a real intelligent machine involve dealing with random disturbances, processing large amounts of imprecise data, interacting with a dynamically changing environment, and coping with uncertainty....
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Explorations in Quantum Computing (Texts in Computer Science)
Explorations in Quantum Computing (Texts in Computer Science)

In the decade since the publication of the first edition of “Explorations in Quantum Computing” the field has blossomed into a rich and diverse body of knowledge, and tremendous progress has been made on building functional quantum computer hardware. Yet I find that a discussion of applications of quantum computers still remains...

Java Cookbook, Second Edition
Java Cookbook, Second Edition

Java Cookbook, 2nd Edition gets you to the heart of what you need to know when you need to know it. The completely revised and updated recipes in Java Cookbook, 2nd Edition cover all of the major APIs from Java 1.4 as well as the new 1.5 version. It includes...

Mac OS X Advanced Development Techniques
Mac OS X Advanced Development Techniques

Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.

The book concentrates on teaching Cocoa development first, and then takes that knowledge and...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy