Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Chemical Reactor Design, Optimization, and Scaleup
Handbook of Chemical Reactor Design, Optimization, and Scaleup
This book is an outgrowth of an earlier book, Chemical Reactor Design, John Wiley & Sons, 1987. The title is different and reflects a new emphasis on optimization and particularly on scaleup, a topic rarely covered in undergraduate or graduate education but of paramount importance to many practicing engineers. The treatment of biochemical and...
MCITP Self-Paced Training Kit (Exam 70-646): Windows Server 2008 Server Administrator
MCITP Self-Paced Training Kit (Exam 70-646): Windows Server 2008 Server Administrator

This training kit is designed for server and domain administrators who have two to three years of experience managing Windows servers and infrastructure in an environment that typically supports 250 to 5,000 (or even more) users in three or more physical locations and has three or more domain controllers. You will likely be responsible...

Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)
Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)

Mathematics and mathematical modelling are of central importance in computer science. For this reason the teaching concepts of mathematics in computer science have to be constantly reconsidered, and the choice of material and the motivation have to be adapted. This applies in particular to mathematical analysis, whose significance has to be...

The Origins of Cauchy's Rigorous Calculus (Dover Books on Mathematics)
The Origins of Cauchy's Rigorous Calculus (Dover Books on Mathematics)
This text for upper-level undergraduates and graduate students examines the events that led to a 19th-century intellectual revolution: the reinterpretation of the calculus undertaken by Augustin-Louis Cauchy and his peers. These intellectuals transformed the uses of calculus from problem-solving methods into a collection of well-defined...
vSphere Virtual Machine Management
vSphere Virtual Machine Management

This book follows a step-by-step tutorial approach with some real-world scenarios that vSphere businesses will be required to overcome every day. This book also discusses creating and configuring virtual machines and also covers monitoring virtual machine performance and resource allocation options.

This book is for VMware
...

Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor

Get the inside scoop on Hyper-V for Windows Server 2008 R2

Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...

Adherence to Antipsychotics in Schizophrenia
Adherence to Antipsychotics in Schizophrenia

Poor adherence to therapy is one of the main obstacles to treatment effectiveness in schizophrenia. It is the main determinant of relapse, hospitalization, symptom persistence, and poor psychosocial functioning and outcome. Adherence to treatment is affected by various factors related to the disease characteristics, to the patient him- or...

Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press)
Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press)
In the last ten years IT has brought fundamental changes to the way the world works. Not only has it increased the speed of operations and communications, but it has also undermined basic assumptions of traditional business models and increased the number of variables. Today, the survival of major corporations is challenged by a world-wide...
Space-Time Coding: Theory and Practice
Space-Time Coding: Theory and Practice
The use of multiple antennas in most future wireless communication systems seems
to be inevitable. Today, the main question is how to include multiple antennas and
what are the appropriate methods for specific applications. The academic interest in
space-time coding and multiple-input multiple-output (MIMO) systems has been...
Implementing SOA : Total Architecture in Practice
Implementing SOA : Total Architecture in Practice
If you are an architect responsible for a service-oriented architecture (SOA) in an enterprise, you face many challenges. Whether intended or not, the architecture you create defines the structure of your enterprise at many different levels, from business processes down to data storage. It defines the boundaries between organizational units as well...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Running Mainframe z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform z Environments
Running Mainframe z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform z Environments

Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy