Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Environmental Nanotechnology Volume 3 (Environmental Chemistry for a Sustainable World)
Environmental Nanotechnology Volume 3 (Environmental Chemistry for a Sustainable World)

This third volume on environmental nanotechnology includes chapters dealing with topics such nanoremediation, waste water purification, nanosensors, nanomedicine, and nanofiltration. It also highlights the safety aspects and risk assessment and management related to several toxins, as well as nanotechnology related solutions for...

MCSE Training Kit-Microsoft Windows XP Professional
MCSE Training Kit-Microsoft Windows XP Professional

Official Microsoft study guide for the skills you need on the job—and on the exam.

Learn how to set up and support the Windows® XP Professional operating system—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace...

Dreamweaver MX 2004 Web Application Recipes
Dreamweaver MX 2004 Web Application Recipes
Why reinvent the wheel every time you design a new Web site? With this book, you don't have to. By providing real-world recipes for building dynamic Web applications using Dreamweaver with ASP, ColdFusion, or PHP, this book shows you how to save time and money while focusing on the things that make your site unique. In these pages, a trio of...
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide

Get the book that shows you not only what--but how--to study

  • Complete coverage of all official exam objectives
  • Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
  • Real-world exercises--Step-by-step instruction...
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Mathematical Models of Spoken Language
Mathematical Models of Spoken Language
Humans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,...
Podcasting: Do It Yourself Guide
Podcasting: Do It Yourself Guide
It's your show, and you can do what you want

Got something to tell the world? Want unlimited listening options? Podcasting makes it happen. It's the hottest communication trend of the twenty-first century, and one of the first guys to jump on board is ready to get you started. Todd helps you choose software, subscribe to the best podcasts,...

Introduction to RF Equipment and System Design
Introduction to RF Equipment and System Design
Applies theoretical fundamentals to real-world issues, heavily relying on examples from recent design projects. Key discussions include system design schemes, circuits and components for system evaluations and design.

An excellent resource for engineers and technicians alike, this practical design guide offers a comprehensive and
...
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions: The Flash Usability Handbook
Flash Application Design Solutions shows you how to harness the power of ActionScript 2.0 and make the most of the improved design tools of Flash 8 to create usable, intuitive Flash interfaces.

In this book, you'll find a number of concrete Flash usability solutions that use elements such as navigation menus, data filtering, forms,
...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Release It!: Design and Deploy Production-Ready Software
Release It!: Design and Deploy Production-Ready Software

You’ve worked hard on the project for more than year. Finally, it looks like all the features are actually complete, and most even have unit tests. You can breathe a sigh of relief. You’re done.

Or are you?

Does “feature complete” mean “production ready”? Is your system
...

Artificial Cognition Systems
Artificial Cognition Systems
The central questions confronting artificial intelligence and cognitive science revolve around the nature of meaning and of mind. Minds are presumed to be the processors of mental content, where that content has the capacity to influence our speech and other behavior. The hard part is figuring out how that is done. Mental states must exercise...
unlimited object storage image
Result Page: 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 915 914 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy