Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer-Aided Design, Engineering, and Manufacturing: Systems Techniques and Applications, Volume I, Systems Technique
Computer-Aided Design, Engineering, and Manufacturing: Systems Techniques and Applications, Volume I, Systems Technique

In the competitive business arena your organization must continually strive to create new and better products faster, more efficiently, and more cost effectively than your competitors to gain and keep the competitive advantage. Computer-aided design (CAD), computer-aided engineering (CAE), and computer-aided manufacturing (CAM) are now the...

Theory of Computing: A Gentle Introduction
Theory of Computing: A Gentle Introduction

The theory of computing provides students with a background in the fundamentals of computing with which to achieve a deeper understanding of contemporary computing systems. Computers are evolving and developing at a dizzying rate. Yet, the fundamentals of pattern matching and programming language design and implementation have remained...

Hacker Attack
Hacker Attack
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or...
A Short Introduction to Intuitionistic Logic (University Series in Mathematics)
A Short Introduction to Intuitionistic Logic (University Series in Mathematics)
`This is the most welcome addition to the literature on intuitionistic logic, providing a substantial reference of value comparable to that of better established references for classical mathematical logic. The development of Mints' book is natural, elegant and accessible, with a minimum of fuss but no lack of attention to...
sed, awk and Regular Expressions Pocket Reference (Pocket Reference (O'Reilly))
sed, awk and Regular Expressions Pocket Reference (Pocket Reference (O'Reilly))

For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write...

The Dying Process : Patients' Experiences of Palliative Care
The Dying Process : Patients' Experiences of Palliative Care
A strong feature of the book... is the copius discussion of socila theory. This is a very good book, by an auhor who is never willing to take fashionable or politically correct statemnets for granted but attempts to assess these in light of knowledge gained through painful fieldwork experience. Clive Seale, University of London.

Focusing...

Object-Oriented Programming With Java
Object-Oriented Programming With Java
Object-Oriented Programming with Java is written for first-year college/university programming courses worldwide. It introduces you to object-oriented design and programming and can be used in computing programs for a first course. The book is aimed at a broad audience of students in science, engineering, and business, where a knowledge of...
Audio Recording for Profit: The Sound of Money
Audio Recording for Profit: The Sound of Money
This book is the first real inside look at the business of professional audio recording, which fuels a multibillion dollar global music industry. Industry pioneer Chris Stone, founder of the legendary Record Plant, provides hard-earned business strategies, guidelines, and advice on every aspect of launching and managing a professional audio...
Logic-Based Artificial Intelligence
Logic-Based Artificial Intelligence

This landmark volume represents the culmination of over 40 years of research in the use of logic as a basis for representing and manipulating problems in the field of artificial intelligence. The use of logic as a basis for commonsense reasoning was started by John McCarthy in 1959. The collection consists of both original research and...

The Practical Handbook of Genetic Algorithms: Applications, Second Edition
The Practical Handbook of Genetic Algorithms: Applications, Second Edition

Rapid developments in the field of genetic algorithms along with the popularity of the first edition precipitated this completely revised, thoroughly updated second edition of The Practical Handbook of Genetic Algorithms. Like its predecessor, this edition helps practitioners stay up to date on recent developments in the field and provides...

Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
The SAP R/3 Guide to EDI and Interfaces
The SAP R/3 Guide to EDI and Interfaces
Contents include Interface Technologies in R/3, concepts of IDocs, predefined IDocs, developing IDocs solutions, timing and triggering interface processing, Internet, automated distribution with ALE, automated business with workflow set up, and more.

With this book find out why:
  • EDI projects with R/3 would often cost...
unlimited object storage image
Result Page: Previous 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy