Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
In the years since the bestselling first edition, fusion research and applications have adapted to service-oriented architectures and pushed the boundaries of situational modeling in human behavior, expanding into fields such as chemical and biological sensing, crisis management, and intelligent buildings.

Handbook of Multisensor Data...

Liquid Sloshing Dynamics: Theory and Applications
Liquid Sloshing Dynamics: Theory and Applications
The problem of liquid sloshing in moving or stationary containers remains of great concern to aerospace, civil, and nuclear engineers; physicists; designers of road tankers and ship tankers; and mathematicians. Beginning with the fundamentals of liquid sloshing theory, this book takes the reader systematically from basic theory to advanced...
Microsoft SQL Server 2008 For Dummies (Computer/Tech)
Microsoft SQL Server 2008 For Dummies (Computer/Tech)

I’ve been using SQL Server for longer than I care to admit. Let’s just say that I remember the days when Microsoft first released its own version of SQL Server after obtaining the rights to it from Sybase Corporation. That was a long time ago!

Why have I been using SQL Server for such a long time? Quite simply, I
...

How to Develop and Implement a Security Master Plan
How to Develop and Implement a Security Master Plan
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs.  It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and...
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
VoIP Handbook: Applications, Technologies, Reliability, and Security
VoIP Handbook: Applications, Technologies, Reliability, and Security
The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.

The VoIP Handbook: Applications, Technologies, Reliability, and...

Essential Windows(r) CE Application Programming
Essential Windows(r) CE Application Programming

The indispensable guide to writing clean CE applications, including real-world tips, techniques, and workarounds.

Microsoft's Windows CE operating system is quickly finding its way into a wide variety of information appliances like Handheld and Palm-size PCs, television set top boxes, smart telephones, and electronic...

Automotive Embedded Systems Handbook (Industrial Information Technology)
Automotive Embedded Systems Handbook (Industrial Information Technology)
Highlighting requirements, technologies, and business models, the Automotive Embedded Systems Handbook provides a comprehensive overview of existing and future automotive electronic systems. It presents state-of-the-art methodological and technical solutions in the areas of in-vehicle architectures, multipartner development...
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Digital piracy. It's a global war -- and it's just begun. Pirates of the Digital Millennium chronicles that war. All of it: media conglomerates vs. teenagers, tech companies vs. content providers, artists battling artists, nations vs. nations, law enforcement vs. organized crime. John Gantz and Jack Rochester cover every side and all the...
Cable Communications Technology
Cable Communications Technology
Cable is now as much in the broadband business as it is television. This book explains the fundamentals of coaxial cable technology and the DSP that controls it, along with the cable modem and voice over IP technology now drastically changing the cable operators’ business. Aimed at working engineers and technicians, it can also be used a...
PHP and MySQL Web Development (4th Edition) (Developer's Library)
PHP and MySQL Web Development (4th Edition) (Developer's Library)

PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy