Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets

Discover Today’s Newest, Best Paths to Sustainable Wealth

  • Master lower-cost, lower-risk ETF investing in tomorrow’s hottest growth areas: healthcare, infrastructure, and green technology
  • Profit from demographic change and other powerful global trends
  • Learn...
Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Create Your Own Digital Photography
Create Your Own Digital Photography

You purchased a digital camera to join the digital revolution. Yet you find yourself still using disposables because your digital camera is too complicated and you don't even know where to start to figure out how to use it. That's where Create Your Own Digital Photography comes in. From...

Mike Meyers' A+ Guide: PC Technician (Exams 220-602, 220-603 & 220-604)
Mike Meyers' A+ Guide: PC Technician (Exams 220-602, 220-603 & 220-604)
Essential Skills for a Successful IT Career

Mike Meyers, the leading authority on CompTIA A+ training and certification, has helped hundreds of thousands of people master the skills covered on the CompTIA A+ exams--and now he can help you, too. Completely updated for the new CompTIA A+ standards, Mike Meyers' CompTIA...

X Power Tools
X Power Tools
This book puts you in charge of the most flexible and adaptable graphical interface in the computer industry. The X Window System underlies graphical desktops on Linux and Unix systems, and supports advanced features of modern graphics cards. More people use the X Window System than ever before, but there are few books about X in print. X Power...
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results
Building Engaged Team Performance: Align Your Processes and People to Achieve Game-Changing Business Results

Harness the Power of Your Most Valuable Resource—Your Workforce!

Process improvement approaches like Six Sigma and Lean Enterprise have worked wonders for countless organizations, but in the drive for true excellence, these approaches are only one important part of the formula.

Building Engaged...

Fundamentals of Multicore Software Development (Chapman & Hall/CRC Computational Science)
Fundamentals of Multicore Software Development (Chapman & Hall/CRC Computational Science)

With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, Fundamentals of Multicore Software Development helps software engineers understand parallel programming and master...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy