Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
This book was written by pioneers in the field and offers a principled approach to studying human work with complex technology. … It seems destined to become a classic in the field.
- Books-on-Line

In the nine compact chapters of Joint Cognitive Systems (JCS), two recognized figures in the field of human factors provide an...

Handbook of Civil Engineering Calculations, Second Edition (Hands on)
Handbook of Civil Engineering Calculations, Second Edition (Hands on)
Manage everyday calculations instantly and accurately-saving you time in the design, construction, and maintenance of all types of structures

Covering all aspects of civil engineering calculations in an easy-to-understand format, the new edition of the Handbook of Civil Engineering Calculations is now revised and...

Game Data Analysis – Tools and Methods
Game Data Analysis – Tools and Methods

Probably the best book available on the overlooked art of game data analysis, this tutorial will help you improve your products by utilizing the right tools and techniques. Written by a dedicated professional in the field.

Overview

  • Familiarize yourself with the main key performance indicators for game...
Scientific Computing with MATLAB and Octave (Texts in Computational Science and Engineering)
Scientific Computing with MATLAB and Octave (Texts in Computational Science and Engineering)

This textbook is an introduction to Scientific Computing, in which several numerical methods for the computer-based solution of certain classes of mathematical problems are illustrated. The authors show how to compute the zeros or the integrals of continuous functions, solve linear systems, approximate functions using polynomials and...

The Sungod's Journey through the Netherworld: Reading the Ancient Egyptian Amduat
The Sungod's Journey through the Netherworld: Reading the Ancient Egyptian Amduat

"The ancient Egyptian sources come alive, speaking to us without seeming alien to our modern ways of thinking. Andreas Schweizer invites us to join the nocturnal voyage of the solar barque and to immerse ourselves, with the 'Great Soul' of the sun, into the darkness surrounding us. Here in the illustrations and texts of the...

Model Driven Architecture: Applying MDA to Enterprise Computing
Model Driven Architecture: Applying MDA to Enterprise Computing
Understand how to tap the potential of MDA for your enterprise systems

In this groundbreaking book, David Frankel presents an inside look at Model Driven Architecture (MDA), a rapid software development and integration approach advanced by the OMG that promotes graceful retargeting of software to different platforms. MDA uses UML-based...

Designing Enterprise Applications with the Java(TM) 2 Platform (Enterprise Edition)
Designing Enterprise Applications with the Java(TM) 2 Platform (Enterprise Edition)

The Java 2 Platform, Enterprise Edition, offers enterprise developers a simplified, component-based approach to creating applications for both intranets and the Internet.

Created by the Enterprise Team of the Java Software group at Sun Microsystems, Designing Enterprise Applications with the Java™ 2 Platform, Enterprise Edition...

FileMaker 8 Functions and Scripts Desk Reference
FileMaker 8 Functions and Scripts Desk Reference
FileMaker 8 Functions and Scripts Desk Reference is the only book on the market expressly focused on describing each calculation formula and how and when to use each one. With this book's real-world, concrete examples of how to use each function, you will go far beyond FileMaker 8's help system. Just as a...
Fundamentals of Wireless Communication
Fundamentals of Wireless Communication
Wireless communication is one of the most vibrant areas in the communication
field today. While it has been a topic of study since the 1960s,
the past decade has seen a surge of research activities in the area. This is
due to a confluence of several factors. First, there has been an explosive
increase in demand for tetherless
...
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Effortless E-Commerce with PHP and MySQL
Effortless E-Commerce with PHP and MySQL

Electronic commerce has been an important and viable part of the Internet for well over a decade now. From the behemoths like Amazon.com to the mom-and-pop online stores, e-commerce is performed in a number of ways. Despite the dozen, or hundred, of failures for every single commercial success, e-commerce can still be an excellent business...

Developing Your Conflict Competence: A Hands-On Guide for Leaders, Managers, Facilitators, and Teams
Developing Your Conflict Competence: A Hands-On Guide for Leaders, Managers, Facilitators, and Teams

A practical resource, this book combines tips, checklists, exercises, and stories to outline concrete processes that improve the way leaders, managers, and anyone within an organization responds to conflict. Beginning with a series of questions and self-diagnostics, the authors show you how to: maintain emotional balance in the face of...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy