Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Essentials of Supply Chain Management, Third Edition
Essentials of Supply Chain Management, Third Edition

The latest thinking, strategies and technologies to stay current in supply chain management

Presenting the core concepts and techniques of supply chain management in a clear, concise and easily readable style, the Third Edition of Essentials of Supply Chain Management outlines the most crucial tenets and concepts of supply...
Intellectual Property in Academia: A Practical Guide for Scientists and Engineers
Intellectual Property in Academia: A Practical Guide for Scientists and Engineers

Given the increasing role of intellectual property (IP) in academic research, it is important for academic scientists to gain greater awareness and knowledge of the various issues involved with IP resulting from their research and inventions. In addition, the line between academic and industrial research has been blurred, and a large amount...

Just Spring
Just Spring

Get a concise introduction to Spring, the increasingly popular open source framework for building lightweight enterprise applications on the Java platform. This example-driven book for Java developers delves into the framework's basic features, as well as advanced concepts such as containers. You'll learn how Spring makes...

25 Recipes for Getting Started with R
25 Recipes for Getting Started with R

R is a powerful tool for statistics, graphics, and statistical programming. It is used by tens of thousands of people daily to perform serious statistical analyses. It is a free, open source system whose implementation is the collective accomplishment of many intelligent, hard-working people. There are more than 2,000 available add-ons, and R...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

Internet-based Control Systems: Design and Applications (Advances in Industrial Control)
Internet-based Control Systems: Design and Applications (Advances in Industrial Control)

The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.

Internet-based Control Systems...

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Environmental remote sensing is the measurement, from a distance, of the spectral features of the Earth’s surface and atmosphere. These measurements are normally made by instruments carried by satellites or aircraft, and are used to infer the nature and characteristics of the land or sea surface, or of the atmosphere, at the...

Oracle Core: Essential Internals for DBAs and Developers
Oracle Core: Essential Internals for DBAs and Developers

When I wrote Practical Oracle 8i, there was a three-week lag between publication and the first e-mail asking me when I was going to produce a 9i version of the book—thanks to Larry Ellison’s timing of the

launch of 9i. That question has been repeated many times (with changes in version number) over the last 12
...
Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty (Studies in Computational Intelligence)
Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty (Studies in Computational Intelligence)
Some information and knowledge are usually represented by human language like “about 100km”, “approximately 39 ?C”, “roughly 80kg”, “low speed”, “middle age”, and “big size”. Perhaps some people think that they are subjective probability or they are fuzziness....
Cloud Computing: Principles and Paradigms
Cloud Computing: Principles and Paradigms

Cloud computing has recently emerged as one of the buzzwords in the ICT industry. Numerous IT vendors are promising to offer computation, storage, and application hosting services and to provide coverage in several continents, offering service-level agreements (SLA)-backed performance and uptime promises for their services. While...

Functional Programming in C#: Classic Programming Techniques for Modern Projects (Wrox Programmer to Programmer)
Functional Programming in C#: Classic Programming Techniques for Modern Projects (Wrox Programmer to Programmer)

FUNCTIONAL PROGRAMMING is an important paradigm of programming that looks back on a long history. The subject has always been very relevant to people who teach others how to program — the clean and logical concepts of functional programming lend themselves especially well to teaching. Certain industries that use computers and self...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy