 
                In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue reading 
                This book shows you how to take full advantage of Blend's interface, together with and Silverlight's vastly improved designer-developer ...
Continue reading 
                Video is one of the most exciting features on today's Internet, with widespread adoption being made possible by advances ...
Continue reading 
                In this book, we look specifically at using Dreamweaver's built-in server behaviors to build dynamic web sites using PHP ...
Continue reading 
                Dreamweaver is Macromedia's bestselling web design/development environment. Dreamweaver has the capability to generate dynamic ...
Continue reading 
                Meant to serve an "entertaining textbook," this book belongs to a rare genre. It is written for all students and practitioners ...
Continue readingBuilding Construction has been the go-to reference for thousands of professionals and students of architecture, engineering, ...
Continue reading 
                This book offers a simple to read, fast way to discover all that's new in Mac OS X Leopard, and how to make the most of ...
Continue reading 
                The purpose of the book is to summarize existing information and assess the level of these uncertainties. We want to stimulate ...
Continue reading 
                This volume addresses a multitude of ecologically relevant aspects: macro- and microclimate; physics, chemistry and biology ...
Continue reading 
                This unique guide provides comprehensive coverage of the key elements of Assembly language programming with in-depth coverage ...
Continue reading 
                Recognized international leaders in their field contribute basic topics of solar physics, space plasmas and the Earth's ...
Continue reading 
                Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Continue reading 
                The Hilbert-Huang Transform ((HHT) is a recently developed technique which is used to analyze nonstationary data. Hydrologic ...
Continue reading 
                Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...
Continue reading 
                HYDROPOWER ECONOMICS examines sustainable alternate energy sources beginning with modeling hydropower and extending the model ...
Continue reading 
                This book collects contributions from leading scientists working on the following topics: Ocean waves, probabilistic models ...
Continue reading 
                The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Continue reading 
                The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Continue reading 
                Integrated Circuit Test Engineering provides a thorough-going and illuminating introduction to test engineering in analogue, ...
Continue reading