Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle Database Programming Using Java and Web Services
Oracle Database Programming Using Java and Web Services
The traditional division of labor between the database (which only stores and manages SQL and XML data for fast, easy data search and retrieval) and the application server (which runs application or business logic, and presentation logic) is obsolete. Although the books primary focus is on programming the Oracle Database, the concepts and...
Customizable  Embedded Processors: Design Technologies and Applications (Systems on Silicon)
Customizable Embedded Processors: Design Technologies and Applications (Systems on Silicon)
Standard Processors have been the fuel for the computer revolution over the last 50 years. A new technology called Custom Embedded Processors is fast becoming the key enabling technology of the next 50 years. In this book the reader will learn the basic theory, and practical examples of how this powerful new approach has been put to use. It's a...
Reading Between the Signs: Intercultural Communication for Sign Language Interpreters 2nd Edition
Reading Between the Signs: Intercultural Communication for Sign Language Interpreters 2nd Edition
Ann Mindess examines a culture not widely understood - American deaf culture. Collectivist and high-context, it contrasts with mainstream individualistic, low-context American culture. Both cultures are examined and the interpreter's role and responsibilities are discussed.

This book provides us with a penetrating look at a subject that,
...
Male Sexual Function: A Guide to Clinical Management (Current Clinical Urology)
Male Sexual Function: A Guide to Clinical Management (Current Clinical Urology)

Male Sexual Function: A Guide to Clinical Management, Second Edition, completely updates and reviews newer developments, including linking erectile dysfunction (ED) with lower urinary tract systems, advances in erectile physiology, and the appreciation of ED as a form of endothelial dysfunction and a harbinger of other potentially lethal...

How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
Pro Ajax and Java Frameworks
Pro Ajax and Java Frameworks

As a Java developer, you want a guide that shows you how to add Ajax functionality to your web applications with a minimum of effort. Well look no further than Pro Ajax and Java Frameworks. In this book, recognized Java experts and authors of the best-selling Apress title, Foundations of Ajax, will show you how.

The...

Evolutionary Robotics: From Algorithms to Implementations
Evolutionary Robotics: From Algorithms to Implementations
Modern robotics has moved from the industrial manufacturing environment to human environment for service and entertainment in the recent few years. The human environment is typically unstructured and quite often everchanging, the robot is required to be capable of independently learning the dynamic environment as well as continuously adjusting its...
Encyclopedia of Homeopathy
Encyclopedia of Homeopathy
Homeopathy is a holistic form of complementary medicine, aiming to treat the whole person rather than just the physical symptoms. It works on the principle that the mind and body are so strongly linked that physical conditions cannot be successfully treated without an understanding of the person’s constitution and character.
...
Automata Theory with Modern Applications
Automata Theory with Modern Applications
'Anderson's book gives an excellent, clearly written account of automata theory.' SIAM Review

Recent applications to biomolecular science and DNA computing have created a new audience for automata theory and formal languages. This is the only introductory book to cover such applications. It begins with a clear and readily
...
Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
The latest edition of this classic is updated with new problem sets and material

The Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instruction. Readers are provided once again with an instructive mix of mathematics, physics, statistics, and information theory.

All the...

Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Designing for Interaction: Creating Smart Applications and Clever Devices (Voices That Matter)
Explore the new design discipline that is behind such products as the iPod and innovative Web sites like Flicer. While other books on this subject are either aimed at more seasoned practitioners or else are too focused on a particular medium like software, this guide will take a more holistic approach to the discipline, looking at interaction...
Result Page: Previous 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy