Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Proof, Language, and Interaction: Essays in Honour of Robin Milner (Foundations of Computing)
Proof, Language, and Interaction: Essays in Honour of Robin Milner (Foundations of Computing)
This volume is a Festschrift to honour the scientilfiifce and achievemento f Robin Milner. Robin’s contributions have been both profound and varied, ovneorw ,a o pfs eormioed , thirty years. They range througthhe semantic foundationso f programming languages, computerassisted theorem-proving, programming language design, andth e theory of...
Hot and Cold Water Supply (British Standards Institution)
Hot and Cold Water Supply (British Standards Institution)

This book provides a highly illustrated guide to the design, installation and maintenance of hot and cold water supply systems for domestic buildings.

Based on British Standard BS 6700, the new edition takes into account revisions to the standard since the book was first published in 1991. It has also been updated to give guidance...

Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Get a data mining recipe for success to increase profits and reduce costs in today’s business world with–This book shows you how to create and implement models of the most commonly asked data mining questions for marketing, sales, risk analysis, and customer relationship management and support. You’ll get proven modeling...
Microsoft(r) Systems Management Server 2.0 Administrator's Companion
Microsoft(r) Systems Management Server 2.0 Administrator's Companion

Microsoft has traditionally geared its development of Microsoft BackOffice applications toward providing network administrators with tools that can facilitate the functionality and management of their Microsoft Windows NT networks. For example, applications such as Microsoft Exchange 5.5 and Microsoft SQL Server 7.0 provide exceptional mail...

Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Evolutionary Algorithms in Molecular Design (Methods and Principles in Medicinal Chemistry)
Evolutionary Algorithms in Molecular Design (Methods and Principles in Medicinal Chemistry)
Nature has solved its most complicated problem, the creation, variation, and improvement of living organisms, in a simple and efficient manner. Starting from primitive forms in earth history, mutation and crossover produced variations that had to struggle for their existence and to compete with their ancestors and genetically...
The Book of JavaScript: A Practical Guide to Interactive Web Pages
The Book of JavaScript: A Practical Guide to Interactive Web Pages
Most Web developers pick up a book to learn how to use a language like JavaScript, looking for practical examples of how to get things done. The Book of JavaScript: A Practical Guide to Interactive Web Pages is plenty practical, and hits the mark as a reader-friendly and well-organized tutorial on JavaScript.

The book...

Surfing the Edge of Chaos: The Laws of Nature and the New Laws of Business
Surfing the Edge of Chaos: The Laws of Nature and the New Laws of Business
Every few years a book changes the way people think about a field. In psychology there is Daniel Goleman's Emotional Intelligence. In science, James Gleick's Chaos. In economics and finance, Burton Malkiel's A Random Walk Down Wall Street. And in business there is now Surfing the Edge of Chaos by Richard...
Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling
Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling
Offender profiling has been developing slowly as a possible investigative tool since 1841 and the publication of Edgar Allen Poe's The Murder in the Rue Morgue. In this book, detective C. Auguste Dupin demonstrates the ability to follow the thought patterns of a companion while they stroll through Paris for 15 minutes without speaking a word. Today...
COM Programming by Example: Using MFC, ActiveX, ATL, ADO, and COM+ (with CD-ROM)
COM Programming by Example: Using MFC, ActiveX, ATL, ADO, and COM+ (with CD-ROM)
Use MFC, ActiveX, ATL, ADO and COM+ to develop COM applications Implement client/server applications with ease with this example-oriented approach to the details and implementation of COM technology in network applications. If there was ever a subject th

Implement client/server applications with
...
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
How to Be a People Magnet : Finding Friends--and Lovers--and Keeping Them for Life
How to Be a People Magnet : Finding Friends--and Lovers--and Keeping Them for Life
Some folks are human magnets. People smile at them wherever they go. They have faithful friends who would do anything for them. They get invited to all the parties. They have more dates than they can handle. What's their secret? According to bestselling author Leil Lowndes, beloved and popular people know the secret of fearless communicating . . ....
unlimited object storage image
Result Page: Previous 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy