Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Linux 3D Graphics Programming (With CD-ROM)
Advanced Linux 3D Graphics Programming (With CD-ROM)
Advanced Linux 3D Graphics Programming builds upon the foundation set in Norman Lin's Linux 3D Graphics Programming. This second volume provides programmers who are experienced in both Linux and fundamental 3D graphics concepts with a well-rounded perspective on 3D theory and practice within the context of programming larger interactive 3D...
Adobe Photoshop CS Type Effects
Adobe Photoshop CS Type Effects
Through twenty stunning, full-color artistic projects and clear step-by-step explanations how to complete them, "Adobe Photoshop CS Type Effects" will help you master the advanced type effect techniques of Photoshop CS. Use Photoshop CS to apply a variety of effects to your text, including a spiral effect for a CD, a tiled mosaic effect,...
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)

Medical imaging has been transformed over the past 30 years by the advent of computerized tomography (CT), magnetic resonance imaging (MRI), and various advances in x-ray and ultrasonic techniques. An enabling force behind this progress has been the (so far) exponentially increasing power of computers, which has made it practical to explore...

Dynamics AX: A Guide to Microsoft Axapta
Dynamics AX: A Guide to Microsoft Axapta
Axapta is Microsoft’s flagship ERP system and the most exciting ERP product currently on
the scene. If Axapta hasn’t come to a computer near you yet, it will soon.

We’d like to start by offering the most valuable piece of advice we have for anyone working
with Axapta (and with any complex system, for that
...
A Programmer's Introduction to C#
A Programmer's Introduction to C#
Written as an introduction to the new C#, this guide takes the experienced C programmer a few steps beyond the basics. It covers objects, data types, and flow control, and even delves into some background on the new Microsoft NET Frameworks environment. Keeping in mind that this is for those familiar with C (and even Java), the book goes into some...
Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
As “techies,” we embrace the ability to understand the technology behind how
and why things work, to a point beyond most other people’s interest. Usually
what drives our interest is curiosity, a curiosity very similar to that which we
experienced in childhood.

Curiosity comes in different shapes and sizes
...
Pro SQL Server 2005 Assemblies
Pro SQL Server 2005 Assemblies
The main aim of this book is to show you each of the different types of .NET assemblies now
possible within SQL Server 2005. This is a major leap in technology for developers and database
administrators alike. Knowing when, how, and why to use this technology is crucial in
continuing to offer stable and efficient database servers and
...
Implementation Strategies for SAP R/3 in a Multinational Organization: Lessons from a Real-World Case Study
Implementation Strategies for SAP R/3 in a Multinational Organization: Lessons from a Real-World Case Study
The purpose of this book is to assemble many of the theories related to implementing
an Enterprise Resource Planning (ERP) system, provide the history of
implementation of SAP R/3 system in a multinational company during 1991-
2004, and analyze the practice using the theories. We include a chapter that
discusses the new products
...
Practices of an Agile Developer: Working in the Real World (Pragmatic Programmers)
Practices of an Agile Developer: Working in the Real World (Pragmatic Programmers)

Want to be a better developer? This books collects the personal habits, ideas, and approaches of successful agile software developers and presents them in a series of short, easy-to-digest tips. This isn't academic fluff; follow these ideas and you'll show yourself, your teammates, and your managers real results. These are the proven...

Best of Ruby Quiz Volume One (Pragmatic Programmers)
Best of Ruby Quiz Volume One (Pragmatic Programmers)
If you stop and think about it, programming knowledge is nearly useless
by itself. What exactly are you going to create with all that expert
programming skill, if it’s all you have? The world needs only so many
text editors.

What makes the craft interesting is how we apply it. Combine programming
prowess with
...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
Result Page: 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy