Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Joomla! For Dummies (Computer/Tech)
Joomla! For Dummies (Computer/Tech)

With its pre-coded modules, open source Joomla! is popular for building interactive Web sites without writing code. This Web site design tool lets you build sites with discussions, polling, RSS feeds, picture submissions, shopping carts, and a lot more, quickly and easily and the quickest, easiest way to learn how to use it is Joomla! For...

Learning Machine Translation (Neural Information Processing)
Learning Machine Translation (Neural Information Processing)
The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently...
Using Hoshin Kanri to Improve the Value Stream
Using Hoshin Kanri to Improve the Value Stream
Every industrial engineer should purchase Using Hoshin Kanri to Improve the Value Stream. It provides the key to using the Hoshin Kanri framework and integrating it with the foundations of industrial engineering.

— Marjorie Koch, President, Lean Division, Institute of Industrial Engineers

Cudneys book...

MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
Today, when computing is pervasive and deployed over a range of devices by a multiplicity of users, we need to develop computer software to interact with both the ever-increasing complexity of the technical world and the growing fluidity of social organizations. The Art of Agent-Oriented Modeling presents a new conceptual model for...
Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

Advances in Intelligent Web Mastering - 2: Proceedings of the 6th Atlantic Web Intelligence Conference
Advances in Intelligent Web Mastering - 2: Proceedings of the 6th Atlantic Web Intelligence Conference

Welcome to the 6th Atlantic Web Intelligence Conference (AWIC 2009), to be held during September 9-11, 2009 in Prague, Czech Republic. The conference will be held at the Faculty of Mathematics and Physics of the Charles University, Prague. This building has a convenient location in the historical city center, in the area called Lesser Town close...

Advanced Functional Programming: 6th International School, AFP 2008, Heijen, The Netherlands, May 19-24, 2008, Revised Lectures
Advanced Functional Programming: 6th International School, AFP 2008, Heijen, The Netherlands, May 19-24, 2008, Revised Lectures

This tutorial book presents seven carefully revised lectures given at the 6th International School on Functional Programming, AFP 2008, in Heijen, The Netherlands in May 2008.

The book presents the following seven, carefully cross-reviewed chapters, written by leading authorities in the field: Self-adjusting: Computation with Delta ML,...

The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

unlimited object storage image
Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy