Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cellular Computing (Genomics and Bioinformatics)
Cellular Computing (Genomics and Bioinformatics)
The field of cellular computing is a novel and exciting development at the intersection of biology, computer science, mathematics, and engineering. Practitioners in this emerging discipline are concerned with the analysis, modeling, and engineering of inter- and intra-cellular processes for the purposes of computation. Developments in the field...
Building Portals with the Java Portlet API (Expert's Voice)
Building Portals with the Java Portlet API (Expert's Voice)
IT SHOULD BE possible to build a portal by plugging components from different vendors into a portal from any vendor. These components are portlets, and we explain how to build them in this book.

The noble aim of the portlet specification—which arose from Sun’s Java Community Process with the collaboration of Sun, IBM, BEA,
...
Windows 2003 Shell Scripting
Windows 2003 Shell Scripting

Pressestimmen

Nicht nur für Administratoren von Windows Server 2003 - auch für Windows XP Poweruser dürfte das unterhaltsame und zugleich informativ verfasste Buch ein wertvoller Ratgeber in Sachen Scripting und Automatisierung sein. [...]Das Buch...
Developing Quality Technical Information: A Handbook for Writers and Editors (2nd Edition)
Developing Quality Technical Information: A Handbook for Writers and Editors (2nd Edition)

The book presents a much needed approach to quality technical communication and a working plan for achieving quality. The examples are excellent and are easy to use and adapt. The editorial advice is simple and clear enough for tech writers who did not major in English or journalism. It is most worthy of a text in university programs, but it...

The Handbook of Human Factors in Web Design (Human Factors and Ergonomics)
The Handbook of Human Factors in Web Design (Human Factors and Ergonomics)

The Handbook of Human Factors in Web Design covers basic human factors issues relating to screen design, input devices, and information organization and processing, as well as addresses newer features which will become prominent in the next generation of Web technologies. These include multimodal interfaces, wireless capabilities,...

Organosilanes in Radical Chemistry
Organosilanes in Radical Chemistry
A large number of papers dealing with silyl radicals, dating back to the late 1940s, have been published. To my knowledge, there are no books on this subject. Several reviews and book chapters on silyl radicals have appeared from time to time on specific aspects. This book focuses on the recent literature of silyl radicals in...
The Business Case For E-Learning
The Business Case For E-Learning

Realize productivity gains from network-driven communication, training, and assessment

The Business Case for E-Learning is the first book that demonstrates the productivity gains provided by Internet learning through a unique approach combining e-communication,...

Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

InstallAnywhere Tutorial and Reference Guide
InstallAnywhere Tutorial and Reference Guide

Software installation and deployment made simple--that's the promise of InstallAnywhere from Zero G Software. Are you harnessing the full potential of InstallAnywhere in your software installation project? InstallAnywhere Tutorial and Reference Guide ...

Network Security Assessment
Network Security Assessment
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by...
How to Feed Friends and Influence People: The Carnegie Deli...A Giant Sandwich, a Little Deli, a Huge Success
How to Feed Friends and Influence People: The Carnegie Deli...A Giant Sandwich, a Little Deli, a Huge Success
the show--and the deli--must go on
In the early morning hours of February 7th, the Carnegie Deli experienced its most unusual takeout order: armed robbers wanted the cash.
The deli always stayed open until 4 a.m. and then re-opened its doors at 6 a.m. The seven robbers must have canvassed the place or received an inside tip about the
...
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
Convergence Technologies for 3G Networks: IP, UMTS, EGPRS and ATM
The merging of voice and data on a single network opens powerful new possibilities in communications. Only a fundamental understanding of both technologies will ensure you are equipped to maximise their full potential.

Convergence Technologies for 3G Networks describes the evolution from cellular to a converged network that...

unlimited object storage image
Result Page: Previous 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy