Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Communicate to Win
Communicate to Win

Communicate to Win is full of sound, practical advice on every aspect of business and personal communication, such as how to: encourage people to like you, understand what motivates people, use the telephone effectively, excel at one-on-one conversation, develop your emotional intelligence, master a good writing style and give...

From Photon to Pixel: The Digital Camera Handbook (Digital Signal and Image Processing)
From Photon to Pixel: The Digital Camera Handbook (Digital Signal and Image Processing)

This second edition of the fully revised and updated From Photon to Pixel presents essential elements in modern digital photographic devices. Our universal infatuation with photography profoundly affects its usage and development.
While some sides of photographic “culture” remain wholly unchanged – art photography,
...

Strategic Employee Communication: Building a Culture of Engagement
Strategic Employee Communication: Building a Culture of Engagement

Employee engagement (or a lack thereof) can often be linked to poor communication and a detachment from company goals. Companies of all sizes are looking for ways to boost communication, recognizing its impact on key business outcomes, such as productivity and profitability.

This book offers fresh insights about...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
A Model for Calculating Interconnection Costs in Telecommunications
A Model for Calculating Interconnection Costs in Telecommunications
The liberalization of the telecommunications markets in Sub-Saharan Africa led to increased competition on the provision and pricing of communication services. But, due to the lack of appropriate regulatory tools, newly established regulators are poorly equipped to arbitrate increasing interconnection disputes between competing operators.
...
Enterprise Information Systems VI
Enterprise Information Systems VI
This book contains the best papers of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), held in Porto (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with PORTUCALENSE UNIVERSITY, who hosted the event.

Following the
...
Distributed and Parallel Systems: From Cluster to Grid Computing
Distributed and Parallel Systems: From Cluster to Grid Computing
The sixthAustrian-HungarianWorkshop onDistributed and Parallel Systems is organized jointly byUniversity of Innsbruck and theMTASZTAKIComputer and Automation Research Institute. The series of workshops started as a small regional meeting early in the nineties, and since then it evolved a lot and became an acknowledged international scientific...
Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities
Risk Analysis: Assessing Uncertainties Beyond Expected Values and Probabilities

Everyday we face decisions that carry an element of risk and uncertainty. The ability to analyze, predict, and prepare for the level of risk entailed by these decisions is, therefore, one of the most constant and vital skills needed for analysts, scientists and managers.

Risk analysis can be defined as a systematic use of...

Autonomic Communication
Autonomic Communication

New paradigms for communication/networking systems are needed in order to tackle such emerging issues as heterogeneity, complexity and management of evolvable infrastructures, thus requiring approaches that are both task- and knowledge-driven. The networking and seamless integration of concepts, technologies and devices in a dynamically changing...

Programming C# 4.0: Building Windows, Web, and RIA Applications for the .NET 4.0 Framework
Programming C# 4.0: Building Windows, Web, and RIA Applications for the .NET 4.0 Framework

With its support for dynamic programming, C# 4.0 continues to evolve as a versatile language on its own. But when C# is used with .NET Framework 4, the combination is incredibly powerful. This bestselling tutorial shows you how to build web, desktop, and rich Internet applications using C# 4.0 with .NET's database capabilities,...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications

Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager...

unlimited object storage image
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy