Home | Amazing | Today | Tags | Publishers | Years | Search 
The Accretion and Obscured Growth of Supermassive Black Holes: First Constraints on the Local Heavily Obscured AGN Fraction with NuSTAR (Springer Theses)
The Accretion and Obscured Growth of Supermassive Black Holes: First Constraints on the Local Heavily Obscured AGN Fraction with NuSTAR (Springer Theses)
This thesis describes the application of state-of-the-art high-energy X-ray studies to the astronomical quest for understanding obscured active galactic nuclei (AGN). These AGN are supermassive black holes growing by accretion of matter located in the nuclei of galaxies. The material that feeds these black holes also obscures them from...
Highs and Lows of European Integration: Sixty Years After the Treaty of Rome
Highs and Lows of European Integration: Sixty Years After the Treaty of Rome

In light of Europe’s prolonged state of crisis, this book reassesses the challenges and prospects of the European integration process. Scholars from diverse disciplines reflect on various types of integration by analyzing political, economic and sociological variables, while also taking legal...

Canadian Public Finance: Explaining Budgetary Institutions and the Budget Process in Canada
Canadian Public Finance: Explaining Budgetary Institutions and the Budget Process in Canada

Broken down into five sections explaining how public budgets are developed, Canadian Public Finance presents a comprehensive account of the budget process of the federal, provincial, and territorial governments. With a specific focus on the public policy process, Geneviève Tellier walks readers through the five steps...

Instructional Design Principles for High-Stakes Problem-Solving Environments
Instructional Design Principles for High-Stakes Problem-Solving Environments

This book examines the types of problems and constraints faced by specialists in the areas of security, medicine, mental health, aviation and engineering. Every day we rely on highly trained specialists to solve complex problems in high-stakes environments, that is, environments involving direct threats to the preservation of human...

Greater Kenyir Landscapes: Social Development and Environmental Sustainability: From Ridge to Reef
Greater Kenyir Landscapes: Social Development and Environmental Sustainability: From Ridge to Reef

This book contains research findings from three major study areas, natural sciences, social sciences, and public policy and management. The focus area extends over geographical zones ranging from mountainous area of Mount Gagau in the Taman Negara National Park, down to the coastal islands of Bidong, Redang and Perhentian on the...

Harnessing Performance Variability in Embedded and High-performance Many/Multi-core Platforms: A Cross-layer Approach
Harnessing Performance Variability in Embedded and High-performance Many/Multi-core Platforms: A Cross-layer Approach

This book describes the state-of-the art of industrial and academic research in the architectural design of heterogeneous, multi/many-core processors. The authors describe methods and tools to enable next-generation embedded and high-performance heterogeneous processors to confront cost-effectively the inevitable variations by...

Making the Tunisian Resurgence
Making the Tunisian Resurgence
This book investigates the socioeconomic factors that triggered Tunisia’s "revolution for dignity” and the current issues and challenges facing its economy while suggesting mechanisms and instruments for their resolution. The author begins by analyzing the roots of the revolution and the post-revolution situation from a...
Non-Inertial Frames and Dirac Observables in Relativity (Cambridge Monographs on Mathematical Physics)
Non-Inertial Frames and Dirac Observables in Relativity (Cambridge Monographs on Mathematical Physics)
Interpreting general relativity relies on a proper description of non-inertial frames and Dirac observables. This book describes global non-inertial frames in special and general relativity. The first part covers special relativity and Minkowski space time, before covering general relativity, globally hyperbolic Einstein space-time, and the...
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Some time ago, one of my colleagues asked me, “What do you like about SQL Server the most?” I had heard this question many times before, and so I provided my usual answer: “SQL Server Internals. I like to understand how the product works and solve complex problems with this knowledge.”

His
...
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.

Get more control of your applications performances in development and production and know how to meet your Service Level Agreement on critical microservices.

Key Features

  • Learn how to write a JavaEE application with performance constraints (Service Level Agreement?SLA) leveraging the...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy