Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Level Up!: The Guide to Great Video Game Design
Level Up!: The Guide to Great Video Game Design

Design and build cutting-edge video games with help from video game expert Scott Rogers!

If you want to design and build cutting-edge video games but aren’t sure where to start, then this is the book for you. Written by leading video game expert Scott Rogers, who has designed the hits Pac Man World, Maxim vs....

Handbook of Chemical and Biological Warfare Agents
Handbook of Chemical and Biological Warfare Agents
With terrorist groups expanding their weapons of destruction beyond bombs and bullets, chemical and biological warfare agents aren't merely limited to the battlefield anymore. In some cases, they are now being used on a new front: major metropolitan cities. And in the Handbook of Chemical and Biological Warfare Agents, emergency response...
Introduction to Cryptography with Java Applets
Introduction to Cryptography with Java Applets
Cryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of...
Pro SQL Server 2008 XML
Pro SQL Server 2008 XML

Knowledge and ability to apply XML are de rigueur in today’s world, and SQL Server developers and administrators are no exception to that rule. Pro SQL Server 2008 XML is your key to unlocking the powerful XML feature set first introduced in SQL Server 2005 and since refined in SQL Server 2008. Author Michael...

Learning Ext JS
Learning Ext JS
By using a series of straightforward examples backed by screenshots, Learning Ext JS will help you create web applications that look good and perform beyond the expectations of your users. This book is written for Web Application Developers who are familiar with HTML but may have little to no experience with JavaScript application development. If...
Just Doing My Job: Stories of Service from World War II
Just Doing My Job: Stories of Service from World War II
Preserving the personal histories of civilians and soldiers who united to defend America during the Second World War, this oral history tells the stories of ordinary citizens who left jobs and families behind to contribute to the war effort. Chronicling the sacrifices made by otherwise average people, this...
Cryptanalysis
Cryptanalysis
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions....
Efficient Structures for Geometric Data Management (Lecture Notes in Computer Science)
Efficient Structures for Geometric Data Management (Lecture Notes in Computer Science)

This book is the revised and extended version of a Pfr.D. dissertation submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley. Many of the ideas presented in this book have their roots in discussions with Eugene Wong, my mentor and thesis advisor. I would like to thank Gene...

Lonely Planet Discover China (Full Color Country Travel Guide)
Lonely Planet Discover China (Full Color Country Travel Guide)

EXPERIENCE THE BEST OF CHINA

The Great Wall, the Yangzi River, the Army of Terracotta Warriors – we’ve selected the most iconic sights and incredible places so you can enjoy the real China with the minimum fuss.

Highlights reveal the must-see attractions and unbeatable experiences...

Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
Chemical Weapons Destruction and Explosive Waste: Unexploded Ordinance Remediations
"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.

This book discusses the current and potential treatment technologies involved in
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy