Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

Algebra DeMYSTiFieD, Second Edition
Algebra DeMYSTiFieD, Second Edition

Your SOLUTION to mastering ALGEBRA!

Trying to tackle algebra but nothing's adding up? No problem! Factor in Algebra Demystified, Second Edition and multiply your chances of learning this important branch of mathematics.

Written in a step-by-step format, this practical guide covers fractions, variables,...

Understanding Digital Signal Processing (3rd Edition)
Understanding Digital Signal Processing (3rd Edition)

Amazon.com’s Top-Selling DSP Book for Seven Straight Years—Now Fully Updated!

Understanding Digital Signal Processing, Third Edition, is quite simply the best resource for engineers and other technical professionals who want to master and apply today’s latest DSP...

Public Libraries and the Internet: Roles, Perspectives, and Implications
Public Libraries and the Internet: Roles, Perspectives, and Implications

The integration of technology into public library services has been a continual process across the eighteenth, nineteenth, twentieth, and twenty-first centuries, in which libraries have responded to new technologies, altering the ways that information could be recorded, accessed, and used. The Internet is a prominent recent example,...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Qualitative Spatial Abstraction in Reinforcement Learning (Cognitive Technologies)
Qualitative Spatial Abstraction in Reinforcement Learning (Cognitive Technologies)
Teaching and learning are difficult tasks not only when people are involved but also with regard to computer programs and machines: When the teaching/learning units are too small, we cannot express sufficient context to teach a differentiated lesson; when they are too large, the complexity of the learning task can increase...
Five-Star Apps: The best iPhone and iPad apps for work and play
Five-Star Apps: The best iPhone and iPad apps for work and play

What makes a five-star app? A program has to be interesting, even if the task it’s performing is routine. When you look at a dozen apps that have the same informational, utilitarian, or entertainment goal, five-star apps have that extra something special that floats to the top.

It can be a concierge, camera, flashlight, game...

All About Market Indicators (All About Series)
All About Market Indicators (All About Series)

Why did professional trader and Market Wizard Linda Raschke move completely out of the stock market three days before a major crash? And what motivated Fred Hickey, a Barron’s Roundtable participant and editor of a monthly investment newsletter, to send out an alert to his subscribers three months before an October crash? And why did...

Adobe Photoshop Elements 9: Maximum Performance: Unleash the hidden performance of Elements
Adobe Photoshop Elements 9: Maximum Performance: Unleash the hidden performance of Elements

Let Mark Galer guide you through the most powerful photo editing tools and techniques that Elements has to offer! A unique cominbtion of step-by-step projects, movie tutorials and sample images will have you creating stunning images in no time at all. Whether you want to enhance your images for maximum...

MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring
MCTS 70-680 Cert Guide: Microsoft Windows 7, Configuring

MCTS Windows 7 Configuring Cert Guide (Exam 70-680) is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows 7. This book covers the “TS: Microsoft Windows...

Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security
Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security

Assist Telco and ISP engineers and technicians in their transition to IP telephony

  • Assists traditional telco engineers and technicians in designing, implementing, and supporting VoIP networks
  • Provides a step-by-step approach to designing a VoIP network
  • Outlines each VoIP...
Algorithms For Interviews
Algorithms For Interviews

Algorithms for Interviews (AFI) aims to help engineers interviewing for software development positions. The primary focus of AFI is algorithm design. The entire book is presented through problems interspersed with discussions. The problems cover key concepts and are well-motivated, challenging, and fun to solve.

We do not
...

Result Page: Previous 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy