Home | Amazing | Today | Tags | Publishers | Years | Search 
Adobe AIR Programming Unleashed
Adobe AIR Programming Unleashed

Covers version 1.5 of Adobe AIR

 

Written to help you hit the ground running, this book teaches you how to build state-of-the-art rich desktop applications on the breakthrough Adobe AIR platform.

 

...
Albright's Chemical Engineering Handbook
Albright's Chemical Engineering Handbook
Taking greater advantage of powerful computing capabilities over the last several years, the development of fundamental information and new models has led to major advances in nearly every aspect of chemical engineering. Albright’s Chemical Engineering Handbook represents a reliable source of updated methods, applications,...
Adobe Photoshop CS4 Classroom in a Book
Adobe Photoshop CS4 Classroom in a Book
The fastest, easiest, most comprehensive way to learn Adobe Photoshop CS4

Fourteen lessons in Adobe Photoshop CS4 Classroom in a Book cover basic and advanced techniques in Adobe Photoshop, the world’s best image-editing software. Learn how to retouch digital photos, work with layers and masks, navigate the
...
Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process(SM)
Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process(SM)
This book gives an overview of Team Software ProcessSM (TSPSM) and real-world details about my experience in successfully implementing TSP and Six Sigma in Microsoft. It also shows how geographically widely distributed new teams were able to deliver on time a very high quality product (two thirds of them with zero defects) with a decent...
The Method Framework for Engineering System Architectures
The Method Framework for Engineering System Architectures
One of the biggest sources of pain in system development is “system integration and test.” This is frequently where projects sailing along with all-green progress reports and Earned Value Management System status summaries start to see these indicators increasingly turn to yellow and then to red. Projects that were thought to be 80...
Piling Engineering
Piling Engineering
This third edition of the well established book has been comprehensively updated. It provides an accessible and well-illustrated account of design techniques, methods of testing and analysis of piles, with a marked emphasis on practice but with design methods that incorporate the most recent advances in piling theory.

Since man
...
Mathematica DeMYSTiFied
Mathematica DeMYSTiFied
Need to learn MATHEMATICA? Problem SOLVED!

Take full advantage of all the powerful capabilities of Mathematica with help from this hands-on guide. Filled with examples and step-by-step explanations, Mathematica Demystified takes you from your very first calculation all the way to plotting complex fractals.

...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
Programming is an art. Although traditional art imitates life, programming simulates life. Every abstract concept in programming, and to a great extent in the fi eld of computer science, has its roots in our daily life. For example, humans and possibly all other living forms were multiprocessing long before the term entered into...
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Secure Key Establishment (Advances in Information Security)
Secure Key Establishment (Advances in Information Security)
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants...

Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI was developed from the sixth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Contributions from the foremost international...
Result Page: Previous 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy