Home | Amazing | Today | Tags | Publishers | Years | Search 
1000 Military Aircraft in Colour
1000 Military Aircraft in Colour

This is a military companion for my 1998 book, 1000 Airlines in Colour. It shows the range of military aeroplanes and the colour schemes worn. The aim is not just to look at the latest fast jets, they are in, but to show the range of aircraft types that have served in uniform over the last forty years. Military aircraft have in recent years...

Data Engineering: Fuzzy Mathematics in Systems Theory and Data Analysis
Data Engineering: Fuzzy Mathematics in Systems Theory and Data Analysis

Although data engineering is a multi-disciplinary field with applications in control, decision theory, and the emerging hot area of bioinformatics, there are no books on the market that make the subject accessible to non-experts. This book fills the gap in the field, offering a clear, user-friendly introduction to the main theoretical and...

Design Patterns Explained: A New Perspective on Object-Oriented Design
Design Patterns Explained: A New Perspective on Object-Oriented Design
"...I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between...
Wireless LANs (2nd Edition)
Wireless LANs (2nd Edition)

This book provides the following benefits to readers:

  • Ability to select the most effective wireless LAN type from a wide assortment of recent and emerging standards.
  • Independent assessment of competing wireless LAN technologies.
  • More efficient design and operational support of wireless LANs because...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Discovering Bluetooth
Discovering Bluetooth
Everyone is always looking for the “next big thing”—especially in the world of technology. Emerging technologies attract interest because of their future application (how will it affect my life?), because of their potential investment value (it’s good to get in on the ground floor of something big), and, quite frankly,...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

MySQL: Building User Interfaces
MySQL: Building User Interfaces

MSQL: Building User Interfaces is written for developers who want to build GUI database applications using MySQL and GTK+. Mathew Stucky demonstrates how to begin, plan, build, and deploy custom applications that can be cross-compiled for either Linux or Microsoft Windows platforms.

Intended for developers who...

New Economy Edge: Strategies and Techniques for Boosting Online Profitability
New Economy Edge: Strategies and Techniques for Boosting Online Profitability
Reports of the power of the internet - for businesses, customers and consumers - have swung violently in nature during the past decade. Some people claim that the ‘new economy’ is the greatest force since the onset of the Industrial Revolution, while others argue that this is hype, pointing to inflated share prices and business failures...
Neurovirology: Viruses and the Brain, Volume 56 (Advances in Virus Research)
Neurovirology: Viruses and the Brain, Volume 56 (Advances in Virus Research)

This volume is the first in a planned series of thematic volumes for Advances in Virus Research. It covers the etiology, pathogenetic mechanisms, and clincial consequences of human neurotropic viruses. Buchmeier is a virologist, Campbell an immunologist, and both are extremely well known in their fields.

Numerous
...

Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Patterns for Time-Triggered Embedded Systems: Building Reliable Applications with the 8051 Family of Microcontrollers (with CD-ROM)
Embedded software is ubiquitous. It forms a core component of an enormous range of systems, from aircraft, passenger cars and medical equipment, to children’s toys, video recorders and microwave ovens. This book provides a complete and coherent set of software patterns to support the development of this type of application. ...
Principles of Oral and Maxillofacial Surgery
Principles of Oral and Maxillofacial Surgery

Since the first edition was published over thirty years ago, this book has become the established introductory textbook for dental students, valued for its accessible, reader-friendly style and absence of superfluous detail. The fourth edition was published in 1991.

The new edition has been updated to reflect advances in the...

Result Page: Previous 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy