Home | Amazing | Today | Tags | Publishers | Years | Search 
Basic Guide to System Safety
Basic Guide to System Safety

This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,...

Project Management Maturity Model: Providing a Proven Path to Project Management Excellence (PM Solutions Research)
Project Management Maturity Model: Providing a Proven Path to Project Management Excellence (PM Solutions Research)

Project Management Maturity Model: Providing a Proven Path to Project Management Excellence offers effective strategies for the implementation of efficient project management systems for increased levels of organizational maturity, time and cost conservation, quality assurance, and project success. It details areas critical to organizational...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)

What makes this book unique is how easy it makes it for you to learn. The author brings you a guide that takes you through a natural sequence of lessons, step-by-step, carefully explaining each concept and staying away from unnecessary technical jargon whilst defining the terms you need to learn. This one-step-at-a-time approach allows anyone...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Hands-On Automation Testing with Java for Beginners: Build automation testing frameworks from scratch with Java
Hands-On Automation Testing with Java for Beginners: Build automation testing frameworks from scratch with Java

Learn Java programming concepts to design automation testing frameworks

Key Features

  • Learn to use Java program logic in application testing
  • Understand various test-driven development concepts with Java tools
  • Master Java with lots of programming...
The Kitty Hawk Venture: A Novel About Continuous Testing in DevOps to Support Continuous Delivery and Business Success
The Kitty Hawk Venture: A Novel About Continuous Testing in DevOps to Support Continuous Delivery and Business Success

An airline is supposed to make the experience of booking a flight easy, trouble free, and reliable. But when scheduling software breaks down and flights get canceled, customers will walk, and heads will roll. That’s what Leigh Freemark faces the day she and her team launch a software upgrade that fails spectacularly and hits...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Computational Network Application Tools for Performance Management (Asset Analytics)
Computational Network Application Tools for Performance Management (Asset Analytics)

This book explores a range of important theoretical and practical issues in the field of computational network application tools, while also presenting the latest advances and innovations using intelligent technology approaches. The main focus is on detecting and diagnosing complex application performance problems so that an optimal...

Practical Testing and Evaluation of Plastics
Practical Testing and Evaluation of Plastics

Engineering with polymers is a growing technical field which requires special knowledge. Filling a need, this ready reference brings together the hard-to-get and recently acquired knowledge usually only found scattered in the original literature. At the beginning, the reference introduces plastics as a class of technical materials,...

Solar Resources Mapping: Fundamentals and Applications (Green Energy and Technology)
Solar Resources Mapping: Fundamentals and Applications (Green Energy and Technology)
This book presents methods for optimising the spatial and network configuration of solar radiation measuring stations. Various physical and mathematical models are demonstrated, which together with high quality measurements, provide the essential tools to generate and validate solar resource estimates to improve the mapping of solar...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy