Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method

Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques and you’re still losing ground. Maybe you’re worried that...

Cloud Capacity Management (Expert's Voice in Information Technology)
Cloud Capacity Management (Expert's Voice in Information Technology)

Cloud Capacity Management helps readers in understanding what the cloud, IaaS, PaaS, SaaS are, how they relate to capacity planning and management  and which stakeholders are involved in delivering value in the cloud value chain. It explains the role of capacity management for a creator, aggregator, and consumer of cloud...

Fabrication of SiGe HBT BiCMOS Technology
Fabrication of SiGe HBT BiCMOS Technology
While the idea of cleverly using silicon–germanium (SiGe) and silicon (Si) strained-layer epitaxy to practice bandgap engineering of semiconductor devices in the highly manufacturable Si material system is an old one, only in the past decade has this concept become a practical reality. The final success of creating novel Si...
Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data
Mastering Structured Data on the Semantic Web: From HTML5 Microdata to Linked Open Data

A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Cryogenic Mixed Refrigerant Processes (International Cryogenics Monograph Series)
Cryogenic Mixed Refrigerant Processes (International Cryogenics Monograph Series)
This monograph deals with mixed refrigerant processes that operate at temperatures less than 123 K. Most conventional cryogenic refrigerators and liquefiers operatewith pure fluids, the major exception being natural gas liquefiers that use mixed refrigerant processes. The fundamental aspects ofmixed refrigerant processes, though...
Innovation and Entrepreneurship: Powerful Tools for a Modern Knowledge-Based Economy (SpringerBriefs in Business)
Innovation and Entrepreneurship: Powerful Tools for a Modern Knowledge-Based Economy (SpringerBriefs in Business)

In this book, Hanadi Mubarak, Ali Husain and Michael promote the concept of innovation incubators from a business-management perspective. The book provides a comprehensive roadmap for the development of new economies based on technology, as well as value added in technology transfer, innovation development and an entrepreneurial climate.

...
The Haskell School of Expression: Learning Functional Programming through Multimedia
The Haskell School of Expression: Learning Functional Programming through Multimedia

Functional programming is a style of programming that emphasizes the use of functions (in contrast to object-oriented programming, which emphasizes the use of objects). It has become popular in recent years because of its simplicity, conciseness, and clarity. This book teaches functional programming as a way of thinking and problem solving,...

Synthetic Fuels Handbook (McGraw-Hill Handbooks)
Synthetic Fuels Handbook (McGraw-Hill Handbooks)
Capitalize on the Vast Potential of Alternative Energy Sources Such as Fuel Cells and Biofuels

Synthetic Fuels Handbook is a comprehensive guide to the benefits and trade-offs of numerous alternative fuels, presenting expert analyses of the different properties, processes, and performance...

Pro WF 4.5
Pro WF 4.5
Now that you have picked up this book and are curious enough to read this introduction, let me share with you how Windows Workflow Foundation (WF) can help you to be a better developer. WF is a Microsoft .NET technology that provides a fascinating way to develop software by defining workflows instead of writing conventional code. ...
Managing Time in Relational Databases: How to Design, Update and Query Temporal Data
Managing Time in Relational Databases: How to Design, Update and Query Temporal Data

Managing Time in Relational Databases shows how to make the rich information content of bi-temporal data available to business users, while simplifying the design, maintenance and retrieval of that data. Metadata declarations eliminate the need to directly model temporal data. Temporal data maintenance is isolated in code that...

The AWK Programming Language
The AWK Programming Language

Computer users spend a lot of time doing simple, mechanical data manipulation - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like. All of these jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose program in a...

unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy