Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
THE ROLE OF a user experience consultant, and specifi cally the user-centered design process, is to help guide and shape the development of products and services based on what the user understands and requires. To do this, the consultant needs to be a facilitator and communicator, ensuring that the right user information is...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

Practice Standard for Work Breakdown Structures: Second Edition
Practice Standard for Work Breakdown Structures: Second Edition

The Project Management Institute, Inc. (PMI) standards and guideline publications, of which the document contained herein is one, are developed through a voluntary consensus standards development process. This process brings together volunteers and/or seeks out the views of persons who have an interest in the topic covered by this...

MasterCases in Hand and Wrist Surgery
MasterCases in Hand and Wrist Surgery

Textbook surgical education usually follows a predictable format involving fairly in-depth descriptions of various pathologic conditions including etiology, pathophysiology, symptomatology, diagnostic procedures, conservative management, and surgical treatment. Although there is variation in the emphasis different books place on each...

Concurrent Programming in Mac OS X and iOS: Unleash Multicore Performance with Grand Central Dispatch
Concurrent Programming in Mac OS X and iOS: Unleash Multicore Performance with Grand Central Dispatch

With the introduction of multicore devices such as the iPad 2 and the quad-core Mac- Book Pro, writing multithreaded apps that take advantage of multiple cores on a device has become one of the biggest headaches for developers. Take, for instance, the introduction of iPad 2. On the launch day, only a few applications, basically those...

Getting the Most from Instagram
Getting the Most from Instagram

If you’re reading this book, chances are you’ve already downloaded the free Instagram app for your iPhone, have snapped a few photos on your own, and probably posted a handful as well. Maybe you have some followers, maybe you don’t... perhaps you’ve found a few interesting Instagram photographers to follow and have...

Specification and Verification of Multi-agent Systems
Specification and Verification of Multi-agent Systems

In the last decade, multi-agent systems have both become widely applied and also increasingly complex. The applications include the use of agents as automous decision makers in often safety-critical, dangerous, or high impact scenarios (traffic control, autonomous satellites, computational markets). The complexity arises from the fact...

Wills and Trusts Kit For Dummies
Wills and Trusts Kit For Dummies

Congratulations. Simply by opening this book you have put yourself a step ahead of most people. Yes. it's tough to think about what will happen to your family afler you die, but confronting these issues is part of taking care of your family.

My goal in writing this book Is to give you the information and resources you...

Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)
Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)

The origin of queueing theory and its application traces back to Erlang’s historical work for telephony networks as recently celebrated by the Erlang Centennial, 100 Years of Queueing, Copenhagen, recalling his first paper in 1909. Ever since, the simplicity and fundamental flavour of Erlang’s famous expressions, such as his...

Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy