Home | Amazing | Today | Tags | Publishers | Years | Search 
Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL
Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL

The Internet is bigger and better than what a mere browser allows. Webbots, Spiders, and Screen Scrapers is for programmers and businesspeople who want to take full advantage of the vast resources available on the Web. There's no reason to let browsers limit your online...

RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
Modern Public Information Technology Systems: Issues and Challenges
Modern Public Information Technology Systems: Issues and Challenges
The nature of governance is rapidly changing, due to new technologies which expand public sector capabilities. Modern Public Information Technology Systems: Issues and Challenges examines the most important dimensions of managing information technology in the public sector. It explores the impact of information technology on governmental...
How Video Works, Second Edition
How Video Works, Second Edition
"Video can be hard to explain and contextualize. This book does a great job of making it easy to understand." - - Algie Abrams, Professional Systems Architect, Microsoft

How Video Works has been a bible for professionals in the video world since 1985. It offers easy to understand explanations of the entire world
...
The Rise of the Blogosphere
The Rise of the Blogosphere
In Consilience: The Unity of Knowledge, biologist Edward O. Wilson writes that a “balanced perspective cannot be acquired by studying disciplines in pieces but through pursuit of the consilience among them. Such unification will come hard. But I think it is inevitable. Intellectually it rings true, and it gratifies impulses that rise from the...
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
Nanoparticulate Drug Delivery Systems (Drugs and the Pharmaceutical Sciences)
Nanoparticulate Drug Delivery Systems (Drugs and the Pharmaceutical Sciences)
This is an up-to-date text which should find its rightful place on the shelves of postgraduates and more senior scientists in the field. It would be of special value to those in other disciplines who have seen the possibilities of nanomedicine but who have not always appreciated the depth of knowledge that already exists, or the complexity of...
Pesticides: A Toxic Time Bomb in Our Midst
Pesticides: A Toxic Time Bomb in Our Midst
The writing of this book came about through a serendipitous circumstance. I wrote a book dealing with child labor in the United States, published three years earlier, containing a chapter that included a description of the hazards migrant farmworkers and their children face, not the least of which was exposure to pesticides. While mentioning the...
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Modelling and Analysis of Enterprise Information Systems
Modelling and Analysis of Enterprise Information Systems

Insight into issues, challenges, and solutions related to the successful applications and management aspects of enterprise information systems may provide to be a hardship to researchers and practitioners. Modelling Analysis of Enterprise Information Systems presents comprehensive coverage and understanding of the organizational and...

Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems

This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and...

Integrated Circuit Packaging, Assembly and Interconnections (Springer Series in Advanced Microelectronics)
Integrated Circuit Packaging, Assembly and Interconnections (Springer Series in Advanced Microelectronics)
The integrated circuit with each new generation has been characterized by increasing functionality. In the 1980’s Very Large Scale Integrated Circuits (VLSIC) began to emerge with transistor counts approaching one million plus per chip! The IC package quickly became more than a “chip carrier”. Now the packaging...
Result Page: Previous 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy