Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Consultant's Handbook
Network Consultant's Handbook
A complete resource for assessing, auditing, analyzing, and evaluating any network environment

With Network Consultants Handbook, you will

  • Learn from network audit and evaluation guidelines that aid in data gathering and analysis of network environments
  • Work with tables and...
The Art of Computer Game Design
The Art of Computer Game Design
The central premise of this book is that computer games constitute a new and as yet poorly developed art form that holds great promise for both designers and players.

This premise may seem laughable or flippant. How could anybody classify the likes of SPACE INVADERS and PAC MAN as art? How can TEMPEST or MISSILE COMMAND compare with
...
Digital People: From Bionic Humans to Androids
Digital People: From Bionic Humans to Androids
Robots, androids, and bionic people pervade popular culture, from classics like Frankenstein and R.U.R. to modern tales such as The Six Million Dollar Man, The Terminator, and A.I. Our fascination is obvious – and the technology is quickly moving from books and films to real life.

In a lab at MIT, scientists and technicians have created...

Concepts of Programming Languages (7th Edition)
Concepts of Programming Languages (7th Edition)
Concepts of Programming Languages describes the fundamental concepts of programming languages by presenting design issues, examining design choices, and critically comparing design alternatives without being language specific. This book is appropriate for anyone who wants to compare and contrast various programming languages.

...
Financial Analysis with Microsoft  Excel
Financial Analysis with Microsoft Excel
FAME explores the use of Excel as THE calculating tool for finance professionals. As students enter College with basic skills for using Excel and other software packages they need for their business courses, the materials they read must be ramped up. The book as it stands covers the main topics that students would see in a typical corporate finance...
Information Systems Development: Advances in Theory, Practice, and Education
Information Systems Development: Advances in Theory, Practice, and Education
This volume is comprised of the proceedings of the 13th International Conference on Information Systems Development held August 26th-28th, 2004, at Vilnius Gediminas Technical University, Vilnius, Lithuania. The aim of this volume is to provide a forum for the research and practices addressing current issues associated with Information Systems...
Code: Version 2.0
Code: Version 2.0
The "alarming and impassioned"* book on how the Internet is redefining constitutional law, now reissued as the first popular book revised online by its readers (*New York Times)

There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's)...

Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
Digital Watermarking for Digital Media
Digital Watermarking for Digital Media
Digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The...
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Security Metrics: Replacing Fear, Uncertainty, and Doubt
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

 

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise....

Extending the Scalability of Linkage Learning Genetic Algorithms: Theory & Practice (Studies in Fuzziness and Soft Computing)
Extending the Scalability of Linkage Learning Genetic Algorithms: Theory & Practice (Studies in Fuzziness and Soft Computing)
Genetic algorithms (GAs) are powerful search techniques based on principles of evolution and widely applied to solve problems in many disciplines. However, most GAs employed in practice nowadays are unable to learn genetic linkage and suffer from the linkage problem. The linkage learning genetic algorithm (LLGA) was proposed to tackle the linkage...
VBA for the 2007 Microsoft(R) Office System (Business Solutions)
VBA for the 2007 Microsoft(R) Office System (Business Solutions)
“VBA for the 2007 Microsoft Office System is jam-packed with code samples that you’ll be able to reuse right away in your VBA projects.”

—Guy Barrette, Microsoft MVP & Regional Director, .NET Expertise

 

...
Result Page: 638 637 636 635 634 633 632 631 630 629 628 627 626 625 624 623 622 621 620 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy