Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C All-in-One Desk Reference For Dummies
C All-in-One Desk Reference For Dummies

This book covers everything users need to get up-to-speed on C programming, including advanced topics to take their programming skill to the next level. It walks C programmers through the entire development cycle of a C program - designing and developing the program, writing source code, compiling the code, linking the code to create the...

Photoshop CS Killer Tips
Photoshop CS Killer Tips

OK, why a book of nothing but tips? Because that's where all the really slick, really useful, and really fun stuff is. It's true! If we're looking through a book and we see the word "Tip" we're all immediately drawn to it, because we know we're about to learn something great. Maybe it's an undocumented keyboard...

Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
This book includes the precautions and procedures that address the concerns of HIPAA, but presents them along with other business components in order to emphasize the need for a holistic approach when constructing and maintaining a business plan.

This book examines business continuity planning as adapted to encompass the requirements of...

Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)

Medical imaging has been transformed over the past 30 years by the advent of computerized tomography (CT), magnetic resonance imaging (MRI), and various advances in x-ray and ultrasonic techniques. An enabling force behind this progress has been the (so far) exponentially increasing power of computers, which has made it practical to explore...

Now You Know Treo
Now You Know Treo
Even a smartphone needs a smart user to take advantage of all of its brillianceespecially when that phone is as jam-packed with features as the Treo. To master all of the Treo's phone, email, Internet, photographic, and organizational capabilities, you need this pocket-sized guide! As the only Treo guide authorized by its maker (palmOne), this one...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Programming Ruby: The Pragmatic Programmers' Guide, Second Edition
Programming Ruby: The Pragmatic Programmers' Guide, Second Edition
Ruby is an increasingly popular, fully object-oriented dynamic programming language, hailed by many practitioners as the finest and most useful language available today. When Ruby first burst onto the scene in the Western world, the Pragmatic Programmers were there with the definitive reference manual, Programming Ruby: The Pragmatic...
The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma
The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma
Alan Turing was one of the most important and influential thinkers of the 20th century. This volume makes his key writings available to a non-specialist readership for the first time. They make fascinating reading both in their own right and for their historic significance: contemporary
computational theory, cognitive science, and artificial
...
Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part I
Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part I
The four-volume set LNCS 3036, LNCS 3037, LNCS 3038 and LNCS 3039 constitutes the refereed proceedings of the 4th International Conference on Computational Science, ICCS 2004, held in Kraków, Poland in June 2004.

The four volumes present more than 550 reviewed contributed and invited papers of the main conference and its 30 workshops....

How Women Make Money
How Women Make Money

How Women Make Money is an inspiring collection of profiles, anecdotes, and practical advice and guides that will help women take control of their lives and attain their financial goals. Whether you are starting a new business, growing an established one, supplementing a pension, working for "extras" for the family, or striving to...

Games Diversions & Perl Culture: Best of the Perl Journal
Games Diversions & Perl Culture: Best of the Perl Journal

This is the third of three “Best of The Perl Journal” O’Reilly books, containing the créme de la créme of the 247 articles published during The Perl Journal ’s five-year existence as a standalone magazine. This particular book contains 47 articles about the leisure pursuits of Perl programmers....

unlimited object storage image
Result Page: Previous 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy