Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout
Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout

Hazardous energy present in systems, machines, and equipment has injured, maimed, and killed many workers. One serious injury can stop the growth of your business in its tracks. Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout provides the practical tools needed to assess hazardous energy in...

Behavioral Emergencies for the Emergency Physician
Behavioral Emergencies for the Emergency Physician

Emergency physicians, in all practice settings, care for patients with both undifferentiated psycho-behavioral presentations and established psychiatric illness. This reference-based text goes beyond diagnostics, providing practical input from physicians experienced with adult emergency psychiatric patients. Physicians will increase their...

Stories that Move Mountains: Storytelling and Visual Design for Persuasive Presentations
Stories that Move Mountains: Storytelling and Visual Design for Persuasive Presentations

Learn how to use stories and visuals to make top–notch presentations

It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success, until now. Developed over a twelve year period as a presentation method to help Enterprise Architects, it was adopted by Microsoft Enterprise...

Telerik WPF Controls Tutorial
Telerik WPF Controls Tutorial

Telerik controls and Windows Presentation Foundation (WPF) are a winning combination, and this tutorial will give you the skills you need to create powerful applications. You'll need to know C#, SQL, and object-oriented design.

Overview

  • Display database information in the Telerik WPF controls
  • ...
Time-Dependent Problems and Difference Methods
Time-Dependent Problems and Difference Methods

Praise for the First Edition

". . . fills a considerable gap in the numerical analysis literature by providing a self-contained treatment . . . this is an important work written in a clear style . . . warmly recommended to any graduate student or researcher in the field of the numerical solution of partial...

JavaScript for Kids: A Playful Introduction to Programming
JavaScript for Kids: A Playful Introduction to Programming

JavaScript is the programming language of the Internet, the secret sauce that makes the Web awesome, your favorite sites interactive, and online games fun!

JavaScript for Kids is a lighthearted introduction that teaches programming essentials through patient, step-by-step examples paired with funny illustrations....

Practical Software Development Techniques: Tools and Techniques for Building Enterprise Software
Python Network Programming Cookbook
Python Network Programming Cookbook

An easy-to-follow guide full of hands-on examples on real-world networking tasks. It covers the advanced topics of network programming in Python using a set of selected recipes.

If you are a network programmer, system/network administrator, or a web application developer, this book is ideal for you. You should have a basic
...

Pro JavaScript Development: Coding, Capabilities, and Tooling
Pro JavaScript Development: Coding, Capabilities, and Tooling

Pro JavaScript Development is a practical guide for front-end web developers who are experienced at building web pages with HTML, CSS, and JavaScript, and now wish to advance their JavaScript skills to a higher level. You will learn how to build large, well-structured, high quality, mobile-optimized web sites and apps, using the...

Computer Security Handbook, Set
Computer Security Handbook, Set

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...

The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

©2015 LearnIT (support@pdfchm.net) - Privacy Policy