Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Social, Ethical and Policy Implications of Information Technology
Social, Ethical and Policy Implications of Information Technology

Legal and ethical issues have become a standard part of engineering and business schools’ curricula. This has not been the case for computer science or management information systems programs although there has been increased emphasis on the social skills of these students. This leaves a frightening void in the student’s professional...

AspectJ in Action: Practical Aspect-Oriented Programming
AspectJ in Action: Practical Aspect-Oriented Programming
TheServerSide.com
"I would highly recommend AspectJ in Action."

Freeroller.net
"You will get the most bang for your buck from Ramnivas' work . . . this book lends itself well to future reuse."

JavaRanch.com
...
Antenna Theory and Design
Antenna Theory and Design
The first edition of Antenna Theory and Design was published in 1981 and the second in 1998. This three-decade span has seen major expansions of antenna application areas, mainly in wireless communications. Along with technology advances has come public awareness of the presence and importance of antennas. Base station antennas are...
Unity 5.x Game AI Programming Cookbook
Unity 5.x Game AI Programming Cookbook

Key Features

  • Empower your agent with decision making capabilities using advanced minimaxing and Negamaxing techniques
  • Discover how AI can be applied to a wide range of games to make them more interactive.
  • Instigate vision and hearing abilities in your agent through collider based and graph...
Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (1 volume)
Handbook of Research on Digital Media and Advertising: User Generated Content Consumption (1 volume)
When first thinking of putting together a compilation of writings on a particular topic, those that have such a notion believe they will give meaning to a paradigm, influence a research area, or at a minimum shed light exploring a critical phenomenon. Ultimately, the editors and authors hope that the exchange for the reader - in...
Cancer Prevention: The Causes and Prevention of Cancer Volume 1 (Cancer Prevention-Cancer Causes)
Cancer Prevention: The Causes and Prevention of Cancer Volume 1 (Cancer Prevention-Cancer Causes)

This Cancer Prevention book series aims to complement the research reported in the journal Cancer Causes and Control. Volumes in this series will summarize the state of the science from causes to prevention of cancer. The scope will be international. The past 20 years has seen an explosion of epidemiologic material on the causes of cancer....

How to Cheat at Designing Security for a Windows Server 2003 Network
How to Cheat at Designing Security for a Windows Server 2003 Network
When looking at an organization's security needs, you should begin with any existing security policies or procedures that the organization might already have in place. We started this chapter with an in-depth examination of how to analyze a company's business requirements for network and data security. This included looking at these existing...
Ultimate Aptitude Tests: Assess Your Potential with Aptitude, Motivational and Personality Tests
Ultimate Aptitude Tests: Assess Your Potential with Aptitude, Motivational and Personality Tests
Recruitment, selection and assessment procedures sometimes make use of aptitude tests, which are designed to measure one’s potential for achievement.

 

The Ultimate...

Principles of Social Psychiatry
Principles of Social Psychiatry

This second edition of Principles of Social Psychiatry appears more than 15 years after the first one, and even a cursory comparison between the contents of the two editions clearly documents that the scope and the impact of the social component of our discipline and profession have remarkably increased during the past few years.

...

Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Fashion Branding and Consumer Behaviors: Scientific Models (International Series on Consumer Science)
Fashion Branding and Consumer Behaviors: Scientific Models (International Series on Consumer Science)

Fashion Branding and Consumer Behaviors presents eye-opening theory, literature review and original research on the mutual influence of branding strategies and consumer response. Contributors use multiple methods to analyze consumers' psychosocial needs and the extent that their fulfillment goes beyond the usefulness or value of...

The All-Around Horse and Rider
The All-Around Horse and Rider
Cinch today’s top new riding techniques

In the past twenty-five years, a number of major innovations in horse handling have gained acceptance in the global community. Now Howell presents a one-stop resource for amateur adult riders to help them understand the new approaches and implement them to achieve fast results.

Written by...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy