Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Configuration Management
Software Configuration Management

An effective systems development and design process is far easier to explain than it is to implement. A framework is needed that organizes the life cycle activities that form the process. This framework is Configuration Management (CM).

Software Configuration Management discusses the framework from a standards viewpoint, using...

Real-Time Collision Detection (The Morgan Kaufmann Series in Interactive 3-D Technology)
Real-Time Collision Detection (The Morgan Kaufmann Series in Interactive 3-D Technology)
Written by an expert in the game industry, Christer Ericson's new book is a comprehensive guide to the components of efficient real-time collision detection systems. The book provides the tools and know-how needed to implement industrial-strength collision detection for the highly detailed dynamic environments of applications such as 3D games,...
Sams Teach Yourself SQL in 10 Minutes, Third Edition
Sams Teach Yourself SQL in 10 Minutes, Third Edition

Sams Teach Yourself SQL in 10 Minutes has established itself as the gold standard for introductory SQL books, offering a fast-paced accessible tutorial to the major themes and techniques involved in applying the SQL language. Forta's examples are clear and his writing style is crisp and concise. As with earlier editions, this revision includes...

Quiet Mind, Fearless Heart: The Taoist Path through Stress and Spirituality
Quiet Mind, Fearless Heart: The Taoist Path through Stress and Spirituality
"Reading Quiet Mind, Fearless Heart is like eavesdropping on a conversation between Lao Tzu and Joseph Campbell—a pure pleasure to read!"
—Deepak Chopra, M.D., coauthor of The Seven Spiritual Laws of Yoga and author of The Spontaneous Fulfillment of Desire

"Quiet Mind, Fearless Heart is an enchanting piece...

Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Network Security Assessment
Network Security Assessment
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by...
Java Foundations
Java Foundations
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
A Relativist's Toolkit: The Mathematics of Black-Hole Mechanics
A Relativist's Toolkit: The Mathematics of Black-Hole Mechanics
'... an elegant, thoughtful, useful and altogether commendable publication.' Contemporary Physics 'The author puts emphasis on training the readers and equipping them with the relevant skills of a working relativist. The text reaches a high pedagogical standard ... In this way the author succeeds in closing a gap in the existing text book...
Data Structures Demystified
Data Structures Demystified

If you’ve been searching for that quick, easy-to-understand guide to walk you through data structures, look no further. Data Structures Demystified is all these things and more. Whether you’re trying to program stacks and linked lists or figure out hashtables, here you’ll find step-by-step instructions to get the...

Text Mining: Predictive Methods for Analyzing Unstructured Information
Text Mining: Predictive Methods for Analyzing Unstructured Information

The growth of the web can be seen as an expanding public digital library collection. Online digital information extends far beyond the web and its publicly available information. Huge amounts of information are private and are of interest to local communities, such as the records of customers of a business. This information is overwhelmingly...

Word Hacks : Tips & Tools for Taming Your Text
Word Hacks : Tips & Tools for Taming Your Text

Few software applications are as ubiquitous as Microsoft Word, which has been around for more than 20 years—practically an eternity in computer time. Even as competitors, such as OpenOffice.org, emerge from the open source community, their success relies heavily on how much they look and act like Word. When most people...

Result Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy