Home | Amazing | Today | Tags | Publishers | Years | Search 
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

PGP: Pretty Good Privacy
PGP: Pretty Good Privacy

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not...

Optimization and Data Analysis in Biomedical Informatics (Fields Institute Communications)
Optimization and Data Analysis in Biomedical Informatics (Fields Institute Communications)

​This volume covers some of the topics that are related to the rapidly growing field of biomedical informatics. In June 11-12, 2010 a workshop entitled ‘Optimization and Data Analysis in Biomedical Informatics’ was organized at The Fields Institute. Following this event invited contributions were gathered based on the talks...

Learning DCOM
Learning DCOM

DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming. Now that components are playing a larger and larger part in Windows 98, Windows NT 4.0, and Windows 2000, every Windows programmer will want to understand the...

Seduced by Success: How the Best Companies Survive the 9 Traps of Winning
Seduced by Success: How the Best Companies Survive the 9 Traps of Winning

Don't let success put your company on the road to ruin

In Seduced by Success, Robert J. Herbold, the former Chief Operating Officer of Microsoft, shows you how to avoid the nine traps of success-the “legacy practices” that almost felled such giants as General Motors, Kodak and Sony. Herbold, a...

Group Cell Architecture for Cooperative Communications (SpringerBriefs in Computer Science)
Group Cell Architecture for Cooperative Communications (SpringerBriefs in Computer Science)

Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication architecture? Group Cell architecture, which was initially brought forward in 2001. Years later, Coordinated Multiple-Point Transmission and...

CMOS RFIC Design Principles (Artech House Microwave Library)
CMOS RFIC Design Principles (Artech House Microwave Library)

Recently, there has been a major push to integrate circuitry and digital signal processors on a single chip to improve wireless digital transmission. CMOS (complementary metal oxide semiconductor) is a key digital integrated circuit technology that is widely used throughout the wireless communications industry. This practical resource offers...

Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...

Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Primary Theory of Electromagnetics (Power Systems)
Primary Theory of Electromagnetics (Power Systems)

This is a textbook on electromagnetics for undergraduate students in electrical engineering, information, and communications. The book contents are very compact and brief compared to other commonly known electromagnetic books for undergraduate students and emphasizes mathematical aspects of basic electromagnetic theory. The book presents...

Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Arduino Electronics Blueprints
Arduino Electronics Blueprints

Make common electronic devices interact with an Arduino board to build amazing out-of-the-box projects

About This Book

  • Build interactive electronic devices using the Arduino
  • Learn about web page, touch sensor, Bluetooth, and infrared controls
  • A project-based guide to create...
Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy