Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Structures Demystified
Data Structures Demystified

If you’ve been searching for that quick, easy-to-understand guide to walk you through data structures, look no further. Data Structures Demystified is all these things and more. Whether you’re trying to program stacks and linked lists or figure out hashtables, here you’ll find step-by-step instructions to get the...

Building a Knowledge-Driven Organization
Building a Knowledge-Driven Organization

In the early 1980s, when Buckman Laboratories was scrambling to meet the rapidly changing needs of its customers, CEO Robert Buckman realized than an organization positioned for the future would have to be organized around knowledge—creating it, sharing it, and applying it—rather than around traditional corporate hierarchies and...

Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Open source technology enables you to build customized enterprise portal frameworks with more flexibility and fewer limitations. This book explains the fundamentals of a powerful set of open source tools and shows you how to use them.

An outstanding team of authors provides a complete tutorial and reference guide to Java Portlet API, Lucene,...

Avid Xpress Pro Power!
Avid Xpress Pro Power!

Unleash your creativity. Let "Avid Xpress ® Pro Power!" be your guide to masterful storytelling using Avid Xpress Pro. Work your way through a variety of editing techniques and learn not only how each function works, but also when and why you should use it. This unique, hands-on book won't bog you down with...

A Textbook of Modern Toxicology
A Textbook of Modern Toxicology
A state-of-the-art toxicology textbook—ideal for students and professionals

Toxicology is a multifaceted field that encompasses the physical and chemical study of all known poisonous substances. It involves the rigorous analysis of toxicants and their effects on living tissues, forensic toxicology, quality assurance...

The JFC Swing Tutorial: A Guide to Constructing GUIs, Second Edition
The JFC Swing Tutorial: A Guide to Constructing GUIs, Second Edition

The JFC Swing Tutorial is back, fully revised and updated to include the latest revisions to the JFC Swing API and the Java™ 2 platform. In this book, authors and Java experts Kathy Walrath, Mary Campione, Alison Huml, and Sharon Zakhour—working closely with the Sun Microsystems Swing team—explore the ins and outs of...

Computer Graphics and Multimedia: Applications, Problems and   Solutions
Computer Graphics and Multimedia: Applications, Problems and Solutions
Making sense of the extensive disciplines and sub-topics within computer
graphics and multimedia is a lifelong challenge. No one can be versed in
all areas at once due to the vast amounts of information that exists on all the
subject areas and due to the dynamic nature of technology. Inevitably, we
specialize. Programmers create
...
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems
Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data,...
The All-Around Horse and Rider
The All-Around Horse and Rider
Cinch today’s top new riding techniques

In the past twenty-five years, a number of major innovations in horse handling have gained acceptance in the global community. Now Howell presents a one-stop resource for amateur adult riders to help them understand the new approaches and implement them to achieve fast results.

Written by...

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
Why spend countless hours searching for relevant thought leadership articles, specific pieces of statistical data, and navigable reference information, when one resource provides it all? In The CTO Handbook, former CTO of IBM Next Generation Group Mark Minevich, guides readers through what need not be a daunting world of IT management - addressing...
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Result Page: Previous 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy