Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C++ Unleashed
C++ Unleashed
C++ Unleashed is a survey of advanced topics in C++. The goal of this book is to provide
a focused examination of each of these topics, covering the essential information
you need to fully exploit the power of the C++ language.

Many of the topics in this book deserve a book in their own right. Because it is not possible,...
Perl/Tk Pocket Reference
Perl/Tk Pocket Reference

The Perl/Tk Pocket Reference is a companion volume to Learning Perl/Tk, an O'Reilly Animal Guide. Learning Perl/Tk is a tutorial for Perl/Tk, the extension to Perl for creating graphical user interfaces. With Tk, Perl programs can be window-based rather than command-line based, with buttons, entry fields, listboxes,...

Visual C++ 6 for Dummies Quick Reference
Visual C++ 6 for Dummies Quick Reference
Get up to speed in Visual C++ in a flash with these instant answers to your programming questions. Visual C++ 6 For Dummies Quick Reference is the fast and friendly way to get the most from your C++ programming for the Windows 95 and Windows 98 environments without having to spend hours on end poring through dense reference books....
Algorithms for VLSI Physical Design Automation, Third Edition
Algorithms for VLSI Physical Design Automation, Third Edition
Algorithms for VLSI Physical Design Automation, Third Edition covers all aspects of physical design. The book is a core reference for graduate students and CAD professionals. For students, concepts and algorithms are presented in an intuitive manner. For CAD professionals, the material presents a balance of theory and practice. An extensive...
Periodontal Therapy: Clinical Approaches and Evidence of Success
Periodontal Therapy: Clinical Approaches and Evidence of Success

A comprehensive review of contemporary periodontics in which clinicians and investigators offer solid treatment options and clinical evidence. The 26 chapters begin with an introduction to the essentials of goal-oriented treatment planning and a discussion of the treatment of medically compromised and juvenile patients, explaining the latest...

Unix Unleashed
Unix Unleashed
Unix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such...
Green's Functions for Solid State Physicists
Green's Functions for Solid State Physicists
This volume shows how the analytic properties in the complex energy plane of the Green's functions of many particle systems account for the physical effects (level, shifts, damping, instabilities) characteristic of interacting systems. It concentrates on general physical principles and, while it does not discuss experiments in detail, includes...
Artificial Intelligence and Software Engineering: Understanding the Promise of the Future
Artificial Intelligence and Software Engineering: Understanding the Promise of the Future
This book is aimed at the computer-literate person who wishes to find out about the reality of exploiting
the promise of artificial intelligence in practical, maintainable software systems. It cuts through the
hype, so commonly associated with discussions of artificial intelligence, and presents the realities, both
the promise and
...
Special Edition Using Linux
Special Edition Using Linux
Linux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera...
Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
Robot Motion Planning and Control (Lecture Notes in Control and Information Sciences)
Robot Motion Planning and Control (Lecture Notes in Control and Information Sciences)

Covers recent & fruitful results in motion planning & control, nonholonomic systems, probablistic algorithms, & collision detection which is a critical operation in algorithmic motion planning. Paper. DLC: Robots - Motion.

How can a robot decide what motions to perform in order to achieve tasks in the physical world...

California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)

Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...

unlimited object storage image
Result Page: Previous 18 19 20 21 22 23 24 25 26 27 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy