Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Advances in Applied Mathematics and Approximation Theory: Contributions from AMAT 2012 (Springer Proceedings in Mathematics & Statistics)
Advances in Applied Mathematics and Approximation Theory: Contributions from AMAT 2012 (Springer Proceedings in Mathematics & Statistics)

Advances in Applied Mathematics and Approximation Theory: Contributions from AMAT 2012 is a collection of the best articles presented at “Applied Mathematics and Approximation Theory 2012,” an international conference held in Ankara, Turkey, May 17-20, 2012. This volume brings together key work from authors in the field...

God's Arbiters: Americans and the Philippines, 1898-1902 (Imagining the Americas)
God's Arbiters: Americans and the Philippines, 1898-1902 (Imagining the Americas)

When the U.S. liberated the Philippines from Spanish rule in 1898, the exploit was hailed at home as a great moral victory, an instance of Uncle Sam freeing an oppressed country from colonial tyranny. The next move, however, was hotly contested: should the U.S. annex the archipelago? The disputants did agree on one point: that the United...

Web Based Project Coaching: Requirements, Design, Implementation and Evaluation of Online Coaching Services (Informationsmanagement und Computer Aided Team)
Web Based Project Coaching: Requirements, Design, Implementation and Evaluation of Online Coaching Services (Informationsmanagement und Computer Aided Team)

The traditional project coaching takes place mostly in a number of face-to-face coaching sessions. However, under conditions of time pressure in IT projects, a physical presence of coaches could form a bottleneck. These facts led to the idea of using Internet technologies to support  the project coaching. The benefits of the web based...

Lebenslaufanalyse und Biografieforschung: Eine Einführung (Studienskripten zur Soziologie) (German Edition)
Lebenslaufanalyse und Biografieforschung: Eine Einführung (Studienskripten zur Soziologie) (German Edition)

Lebenslaufanalyse und Biografieforschung haben sich in den letzten Jahrzehnten zu einem zentralen Instrument der Untersuchung von Individualisierung in dynamischen Gesellschaften entwickelt. Der Band erläutert die wichtigsten Theorien auf diesem Gebiet (Generation, Alter, Biografie, Institutionalisierung). Die qualitativen und...

Combined Scintigraphic and Radiographic Diagnosis of Bone and Joint Diseases
Combined Scintigraphic and Radiographic Diagnosis of Bone and Joint Diseases

The third edition of Combined Scintigraphic and Radiographic Diagnosis of Bone and Joint Diseases has been comprehensively rewritten and rearranged. It now encompasses, in addition to the bone and joint diseases described in the two earlier editions, hitherto unpublished novel applications of pinhole scanning to the diagnosis of a broader...

The Rationale of Operative Fracture Care
The Rationale of Operative Fracture Care

Long awaited 3rd edition of a classic.

Over 1,900 illustrations.

Written by surgeons for surgeons.

All chapters have been revised and updated to reflect the advances in fracture care.

...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Beginning Software Engineering
Beginning Software Engineering

A complete introduction to building robust and reliable software

Beginning Software Engineering demystifies the software engineering methodologies and techniques that professional developers use to design and build robust, efficient, and consistently reliable software. Free of jargon and assuming no previous
...

Network and System Security, Second Edition
Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of...

Introducing Data Science: Big Data, Machine Learning, and more, using Python tools
Introducing Data Science: Big Data, Machine Learning, and more, using Python tools

Summary

Introducing Data Science teaches you how to accomplish the fundamental tasks that occupy data scientists. Using the Python language and common Python libraries, you'll experience firsthand the challenges of dealing with data at scale and gain a solid foundation in data science.

...

Managing the Matrix: The Secret to Surviving and Thriving in Your Organization
Managing the Matrix: The Secret to Surviving and Thriving in Your Organization

A comprehensive guide to excelling in a complex matrix organization

Debra was not in a good mood as she entered Johann’s office for their third meeting. One of her colleagues had just been promoted and, although the guy who got it was good, she didn’t think he was any better than her. Well, except at one...

Android Security Internals: An In-Depth Guide to Android's Security Architecture
Android Security Internals: An In-Depth Guide to Android's Security Architecture

"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword

...
©2017 LearnIT (support@pdfchm.net) - Privacy Policy