Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enabling Sustainable Energy Transitions: Practices of legitimation and accountable governance
Enabling Sustainable Energy Transitions: Practices of legitimation and accountable governance
This open access book reframes sustainable energy transitions as being a matter of resolving accountability crises. It demonstrates how the empirical study of several practices of legitimation can analytically deconstruct energy transitions, and presents a typology of these practices to help determine whether energy...
.NET Framework Solutions: In Search of the Lost Win32 API
.NET Framework Solutions: In Search of the Lost Win32 API
If you've begun programming using Microsoft's .NET Framework, you've discovered a lot of new and improved functionality. But, more than likely, you've also discovered a lot of missing functionality. Indeed, a third of the functions supported by the old Win32 API are not yet supported by .NET. Although you may not at first notice the loss of Win32...
The Relational Model for Database Management: Version 2
The Relational Model for Database Management: Version 2
Today, if you have a well-designed database management system, you have the keys to the kingdom of data processing and decision support. That is why there now exists a prototype machine whose complete design is based on the relational model. Its arithmetic hardware is a quite minor part of thearchitecture. In fact, the old term "computer...
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

The Science of Hate: How prejudice becomes hate and what we can do to stop it
The Science of Hate: How prejudice becomes hate and what we can do to stop it

Why do people commit hate crimes? A world-leading criminologist explores the tipping point between prejudice and hate crime, analysing human behaviour across the globe and throughout history in this vital book.

'Utterly brilliant . . . powerful . . . From personal histories to broader social
...

Managing Software Deliverables, First Edition : A Software Development Management Methodology
Managing Software Deliverables, First Edition : A Software Development Management Methodology

Managing Software Deliverables—A Software Development Management Methodology describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these...

Enterprise Service Bus
Enterprise Service Bus
Enterprise Service Bus provides an architectural overview of the ESB, showing how it can bring the task of integration of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional, using an event-driven Service-Oriented...
Real-Time Systems Design and Analysis
Real-Time Systems Design and Analysis
This book is an introduction to real-time systems. It is intended not as a cookbook,
but, rather, as a stimulus for thinking about hardware and software in a different
way. It is necessarily broader than deep. It is a survey book, designed to heighten
the reader’s awareness of real-time issues.

This book is the
...
Computational Engineering - Introduction to Numerical Methods
Computational Engineering - Introduction to Numerical Methods
This book is an introduction to modern numerical methods in engineering. It covers applications in fluid mechanics, structural mechanics, and heat transfer as the most relevant fields for engineering disciplines such as computational engineering, scientific computing, mechanical engineering as well as chemical and civil engineering. The content...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide
Hadoop got its start in Nutch. A few of us were attempting to build an open source web search engine and having trouble managing computations running on even a handful of computers. Once Google published its GFS and MapReduce papers, the route became clear. They’d devised systems to solve precisely the...
Philosopher Kings?: The Adjudication of Conflicting Human Rights and Social Values
Philosopher Kings?: The Adjudication of Conflicting Human Rights and Social Values

Philosopher Kings? The Adjudication of Conflicting Human Rights and Social Values, by George C. Christie, examines the attempts by courts to sort out conflicts involving freedom of expression, including religious expression, on the one hand, and rights to privacy and other important social values on the other. It...

Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

unlimited object storage image
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy