Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing Software for Symbian OS 2nd Edition: A Beginner's Guide to Creating Symbian OS v9 Smartphone Applications in C++
Developing Software for Symbian OS 2nd Edition: A Beginner's Guide to Creating Symbian OS v9 Smartphone Applications in C++
Developing Software for Symbian OS 2nd Edition is an essential guide for anyone wishing to start de3veloping smartphone applications. The original book has been updated to cover Symbian OS v9 and changes to the developer environment, and now includes a new chapter on application signing and platform security.

Steve Babin's clear and...

Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,...
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)

Why do people lie?

Do gender and personality differences affect how people lie?

How can lies be detected?

Detecting Lies and Deceit provides the most comprehensive review of deception to date. This revised edition provides an up-to-date...

Aeronautical Radio Com Systems and Networks
Aeronautical Radio Com Systems and Networks
Typically, there are over twenty radio systems on board the average commercial jet aircraft dealing with communication, navigation and surveillance functions. Very high frequency (VHF) air-to-ground communication is usually the main method of  information and control exchange between pilot and air traffic control. Satellite and high frequency...
Software Development Rhythms: Harmonizing Agile Practices for Synergy
Software Development Rhythms: Harmonizing Agile Practices for Synergy
In the deep dark night, lying down on Kande beach on the shores of Lake Malawi, we looked up into the cloudless sky. Countless tiny stars were blinking at us. A little tired, or perhaps just mesmerized by those distant, mysterious lights, we closed our eyes and began to hear more, the peaceful slap of water on the little beach, and the small,...
Influence Without Authority (2nd Edition)
Influence Without Authority (2nd Edition)
At some point, almost all of us will find ourselves in the same bind at work: we know what needs to be done and how to do it, but we can't get the right people on board. The risk is allowing frustration to become resignation—or unproductive retaliation. Fortunately, the new and improved Influence Without Authority, Second Edition offers a...
Building Self-confidence for Dummies
Building Self-confidence for Dummies
Includes advice on making a great first impression

Be more confident in all walks of life

We could all use a little more confidence in our lives. With a push in the right direction, you can discover how to carry yourself confidently at work, at home, and even in relationships. This friendly guide shows you what confidence is and where...

Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Bioinformatics - From Genomes to Therapies
Bioinformatics - From Genomes to Therapies
"This treatise on bioinformatics is an excellent reference set to use as additional reading in advanced undergraduate and graduate courses..."
(ChemMedChem, October 2007)

Once again, Thomas Lengauer has succeeded in creating a comprehensive and immensely useful resource that meets even the high
...
Effective Methods for Software Testing
Effective Methods for Software Testing

Stop looking for needles in haystacks.

There's a better way.

The Sarbanes-Oxley Act has made quality testing crucial to the software development process. William Perry's Quality Assurance Institute has developed a proven set of guidelines and checklists to help you...

Parameter Estimation for Scientists and Engineers
Parameter Estimation for Scientists and Engineers
The subject of this book is estimating parameters of expectation models of statistical observations. The book describes what I consider the most important aspects of the subject for applied scientists and engineers. From experience, I know that this group of users is often not aware of estimators other than least squares. Therefore, one of my...
Result Page: 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy