Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unlocking Creativity: How to Solve Any Problem and Make the Best Decisions by Shifting Creative Mindsets
Unlocking Creativity: How to Solve Any Problem and Make the Best Decisions by Shifting Creative Mindsets

Tear down the obstacles to creative innovation in your organization

Unlocking Creativity is an exploration of the creative process and how organizations can clear the way for innovation. In many organizations, creative individuals face stubborn resistance to new ideas. Managers and executives oftentimes...

SQL Server Advanced Data Types: JSON, XML, and Beyond
SQL Server Advanced Data Types: JSON, XML, and Beyond

SQL Server Advanced Data Types attempts to demystify the complex data types that are available to developers in modern versions of SQL Server. Over the last couple of years, I have noticed that many SQL developers have heard of each of the complex data types available in SQL Server but often avoid using them, as they are not sure how these...

Sensing of Non-Volatile Memory Demystified
Sensing of Non-Volatile Memory Demystified
Research, development, and commercialization of emerging non-volatile memories (NVMs) are being aggressively pursued by the design community to supplement and/or substitute conventional volatile and NV memory technologies that are facing stiff scalability challenges. The emerging NVMs such as Magnetic RAM (MRAM),...
Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Introduction to Quantum Theory
Introduction to Quantum Theory
"The expertise of Paul shows in the easy transitions made between discussions of theory and experiment, particularly in subjects related to quantum optics."
M.C. Ogilvie, Choice Magazine

Providing a deeper understanding of the microscopic world through quantum theory, this supplementary text covers a wider
...
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum Computing for Computer Architects (Synthesis Lectures on Computer Architecture)
Quantum computationmay seem to be a topic for science fiction, but small quantum computers have existed for several years and larger machines are on the drawing table. These efforts have been fueled by a tantalizing property: while conventional computers employ a binary representation that allows computational power to scale linearly with resources...
Adobe After Effects 6.5 Studio Techniques
Adobe After Effects 6.5 Studio Techniques
Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of...
Alternative Energy Demystified
Alternative Energy Demystified
This book is for people who want to learn about diverse energy sources and technologies without taking a formal course. It can serve as a classroom supplement, tutorial aid, self-teaching guide, or home-schooling text.

As you take this course, you’ll encounter multiple-choice quizzes and a fi nal exam to help you measure your
...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy