Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
The Method of Moments in Electromagnetics
The Method of Moments in Electromagnetics
Responding to the need for a clear, up-to-date introduction to the field, The Method of Moments in Electromagnetics explores surface integral equations in electromagnetics and presents their numerical solution using the method of moments (MOM) technique. It provides the numerical implementation aspects at a nuts-and-bolts level...
SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

A Guide to Eighteenth-Century Art
A Guide to Eighteenth-Century Art

A Guide to Eighteenth-Century Art offers an introductory overview of the art, artists, and artistic movements of this exuberant period in European art, and the social, economic, philosophical, and political debates that helped shape them. 

  • Covers both artistic developments and critical approaches to the period...
Necessity Lost: Modality and Logic in Early Analytic Philosophy, Volume 1
Necessity Lost: Modality and Logic in Early Analytic Philosophy, Volume 1
A long tradition, going back to Aristotle, conceives of logic in terms of necessity and possibility: a deductive argument is correct if it is not possible for the conclusion to be false when the premises are true. A relatively unknown feature of the analytic tradition in philosophy is that, at its very inception, this venerable conception of the...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

e-Business Strategies for Virtual Organizations (Computer Weekly Professional)
e-Business Strategies for Virtual Organizations (Computer Weekly Professional)
'e-Business Strategies for Virtual Organizations' enables IT managers and directors to develop and implement IT strategies and infrastructures for new models of doing business based on the Internet.

The authors provide a brief introduction to the concepts and strategic issues surrounding information warfare, managing organizational
...
Beyond the Bottom Line: Socially Innovative Business Owners
Beyond the Bottom Line: Socially Innovative Business Owners

Quarter examines business owners who use their firms as laboratories for social innovation. After providing an introduction to this phenomenon in an historical perspective and discussing the 19th-century British industrialist Robert Owen, he provides ll case studies of contemporary innovators from six countries-the UK, US, the Netherlands,...

Computational Optimization, Methods and Algorithms (Studies in Computational Intelligence)
Computational Optimization, Methods and Algorithms (Studies in Computational Intelligence)

Computational optimization is an important paradigm with a wide range of applications. In virtually all branches of engineering and industry, we almost always try to optimize something - whether to minimize the cost and energy consumption, or to maximize profits, outputs, performance and efficiency. In many cases, this search for...

Clothes and Monasticism in Ancient Christian Egypt (Routledge Studies in Religion)
Clothes and Monasticism in Ancient Christian Egypt (Routledge Studies in Religion)

This book is an exploration of the ideals and values of the ascetic and monastic life, as expressed through clothes. Clothes are often seen as an extension of us as humans, a determinant of who we are and how we experience and interact with the world. In this way, they can play a significant role in the embodied and...

Advanced Memory Optimization Techniques for Low-Power Embedded Processors
Advanced Memory Optimization Techniques for Low-Power Embedded Processors
The design of embedded systems warrants a new perspective because of the following two reasons: Firstly, slow and energy inefficient memory hierarchies have already become the bottleneck of the embedded systems. It is documented in the literature as the memory wall problem. Secondly, the software running on the contemporary embedded devices is...
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and Torture: An Interdisciplinary Perspective
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
unlimited object storage image
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy