Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computerized Adaptive Testing: Theory and Practice
Computerized Adaptive Testing: Theory and Practice
Modern computer technology has opened up several new possibilities for optimizing the administration of educational and psychological tests. In computer adaptive testing (CAT), tests are automatically tailored to the proficiency level of the individual examinees. Currently, nearly all large-scale testing programs in the western world are already...
The Constant Contact Guide to Email Marketing
The Constant Contact Guide to Email Marketing

The leading email marketing firm shows you how to create high-impact, low-cost campaigns

Email marketing is an incredibly cost-effective way to establish and build relationships that drive business success. But, it can also be a challenge because the inbox is a hostile environment. Whether your email is noteworthy—or...

What is Sarbanes-Oxley?
What is Sarbanes-Oxley?

The Sarbanes-Oxley Act is unquestionably important to corporate America. It can also be complex and confusing, for everyone from the employees who must be doubly aware of what they can—and cannot—do to the officers who must take legal responsibility for the actions, errors, and omissions of those employees.

What is...

When Pancakes Go Bad: Optical Delusions with Adobe Photoshop
When Pancakes Go Bad: Optical Delusions with Adobe Photoshop
If you've ever found yourself looking at funny images and thinking "Hey, how?d they do that?", this is the book that will give you the answer! Learn how to have fun with photos?swapping pictures of historical inventions with modern-day appliances or combining images of animals to produce unrealistic characters. "When Pancakes Go...
The Aftershock Investor: A Crash Course in Staying Afloat in a Sinking Economy
The Aftershock Investor: A Crash Course in Staying Afloat in a Sinking Economy

Advice on protection and profits in the short and long term future from the experts who accurately predicted the financial crisis of 2008, and who now have more detailed information about what is yet to come

From the authors who accurately predicted the domino fall of the conjoined real estate, stock, and private debt...

Model-Based Signal Processing (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
Model-Based Signal Processing (Adaptive and Learning Systems for Signal Processing, Communications and Control Series)
A unique treatment of signal processing using a model-based perspective

Signal processing is primarily aimed at extracting useful information, while rejecting the extraneous from noisy data. If signal levels are high, then basic techniques can be applied. However, low signal levels require using the underlying physics to correct the problem...

Windows Vista Security: Securing Vista Against Malicious Attacks
Windows Vista Security: Securing Vista Against Malicious Attacks

It's not the computer. The hacker's first target is YOU!

A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and...

Fedora Unleashed, 2008 Edition (8th Edition)
Fedora Unleashed, 2008 Edition (8th Edition)
Welcome to Fedora Unleashed, 2008 Edition! This book covers the free Linux distribution named Fedora and includes a fully functional and complete operating system produced by the Fedora Project, sponsored by Red Hat.

Fedora is directly descended from one of the most popular Linux distributions ever: Red Hat Linux. Those of you who know
...
Holographic Imaging
Holographic Imaging
This is a book about the three-dimensional imaging technique of holography. It covers the fundamental physical and optical principles of using diffraction to record and reconstruct images, human perception, and the history of holographic imaging with an approachable explanation of both basic and advanced holographic concepts. This authoritative...
Human-Computer Interaction: Second IFIP TC 13 Symposium, HCIS 2010
Human-Computer Interaction: Second IFIP TC 13 Symposium, HCIS 2010

The IFIP World Computer Congress (WCC) is one of the most important conferences in the area of computer science at the worldwide level and it has a federated structure, which takes into account the rapidly growing and expanding interests in this area. Informatics is rapidly changing and becoming more and more connected to a number of human...

The Routledge Companion to Sexuality and Colonialism (Routledge Companions to Gender)
The Routledge Companion to Sexuality and Colonialism (Routledge Companions to Gender)

Unique in its global and interdisciplinary scope, this collection brings together comparative insights across European, Ottoman, Japanese, and US imperial contexts while spanning colonized spaces in Latin America, the Caribbean, Africa, the Indian Ocean, the Middle East, and East and Southeast Asia. Drawing on interdisciplinary perspectives...

Infectious Greed: Restoring Confidence in America's Companies
Infectious Greed: Restoring Confidence in America's Companies
In Infectious Greed, two leading financial experts offer a powerful new explanation of why the corporate scandals happened—and propose market-driven reforms that don't just "patch" the system but fix it for generations to come. Discover how the system came to provide massive incentives for...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy