Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Python High Performance Programming
Python High Performance Programming

If you have at least a basic knowledge of Python, this book will help you maximize the performance of your code and applications. Easy to follow tutorials will make you a hard act to follow in Python programming.

Overview

  • Identify the bottlenecks in your applications and solve them using the best...
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark

Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics...

The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Political Trials in an Age of Revolutions: Britain and the North Atlantic, 1793?1848 (Palgrave Histories of Policing, Punishment and Justice)
Political Trials in an Age of Revolutions: Britain and the North Atlantic, 1793?1848 (Palgrave Histories of Policing, Punishment and Justice)

This collection provides new insights into the ’Age of Revolutions’, focussing on state trials for treason and sedition, and expands the sophisticated discussion that has marked the historiography of that period by examining political trials in Britain and the north Atlantic world from the 1790s and into the...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Math You Can't Use: Patents, Copyright, and Software
Math You Can't Use: Patents, Copyright, and Software
The field of software is awash in disputes. Market participants and analysts routinely disagree on how computer programs should be produced, marketed, regulated, and sold. On one subject, however, just about everyone can agree: the current intellectual property protection regime for software is a mess. At present, all of the traditional means...
Starfinder
Starfinder

Combining a concise practical guide to astronomy with card decks, sky maps, and a flashlight, Starfinder explains how to navigate around the night sky, shows you what you can expect to see, and provides all the tools you need to see the constellations for yourself. It also includes a section on observing the Moon, planets, and other...

Debugging the Development Process
Debugging the Development Process
This book might make Microsoft sound bad.

At least that's one of the concerns I had about telling so many Microsoft war stories. I considered softening and smoothing over some of the stories, or leaving them out altogether, but apart from changing people's names, I decided to keep this book and its examples grounded in reality so that it
...
Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation
Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation

It's the trap that ensnares virtually every business. We focus on process: "how" we're doing the job. And we forget about the bigger issue: "what" we're doing and "why" we're doing it. That's why we're leaving so much value on the table. In Rethink, business architect Ric Merrifield...

Data Protection
Data Protection
At first sight, Data Protection may not appear to affect the library professional unduly. The 1998 Data Protection Act only applies to information about people. Most of the material held in a typical library will not be covered.

But this first impression would be wrong. Librarians deal with people every day. They hold information about
...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy