Home | Amazing | Today | Tags | Publishers | Years | Search 
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Digital piracy. It's a global war -- and it's just begun. Pirates of the Digital Millennium chronicles that war. All of it: media conglomerates vs. teenagers, tech companies vs. content providers, artists battling artists, nations vs. nations, law enforcement vs. organized crime. John Gantz and Jack Rochester cover every side and all the...
Liquid Sloshing Dynamics: Theory and Applications
Liquid Sloshing Dynamics: Theory and Applications
The problem of liquid sloshing in moving or stationary containers remains of great concern to aerospace, civil, and nuclear engineers; physicists; designers of road tankers and ship tankers; and mathematicians. Beginning with the fundamentals of liquid sloshing theory, this book takes the reader systematically from basic theory to advanced...
Microsoft SQL Server 2008 For Dummies (Computer/Tech)
Microsoft SQL Server 2008 For Dummies (Computer/Tech)

I’ve been using SQL Server for longer than I care to admit. Let’s just say that I remember the days when Microsoft first released its own version of SQL Server after obtaining the rights to it from Sybase Corporation. That was a long time ago!

Why have I been using SQL Server for such a long time? Quite simply, I
...

How to Develop and Implement a Security Master Plan
How to Develop and Implement a Security Master Plan
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs.  It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and...
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
VoIP Handbook: Applications, Technologies, Reliability, and Security
VoIP Handbook: Applications, Technologies, Reliability, and Security
The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.

The VoIP Handbook: Applications, Technologies, Reliability, and...

Essential Windows(r) CE Application Programming
Essential Windows(r) CE Application Programming

The indispensable guide to writing clean CE applications, including real-world tips, techniques, and workarounds.

Microsoft's Windows CE operating system is quickly finding its way into a wide variety of information appliances like Handheld and Palm-size PCs, television set top boxes, smart telephones, and electronic...

Automotive Embedded Systems Handbook (Industrial Information Technology)
Automotive Embedded Systems Handbook (Industrial Information Technology)
Highlighting requirements, technologies, and business models, the Automotive Embedded Systems Handbook provides a comprehensive overview of existing and future automotive electronic systems. It presents state-of-the-art methodological and technical solutions in the areas of in-vehicle architectures, multipartner development...
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Design of Experiments in Chemical Engineering: A Practical Guide
Design of Experiments in Chemical Engineering: A Practical Guide

While existing books related to DOE are focused either on process or mixture factors or analyze specific tools from DOE science, this text is structured both horizontally and vertically, covering the three most common objectives of any experimental research:

  • screening designs
  • mathematical modeling, and...
Maintenance Engineering Handbook (McGraw-Hill Handbooks)
Maintenance Engineering Handbook (McGraw-Hill Handbooks)
Stay Up to Date on the Latest Issues in Maintenance Engineering

The most comprehensive resource of its kind, Maintenance Engineering Handbook has long been a staple for engineers, managers, and technicians seeking current advice on everything from tools and techniques to planning and scheduling. This brand-new edition...

Effective Prototyping with Excel: A practical handbook for developers and designers (Interactive Technologies)
Effective Prototyping with Excel: A practical handbook for developers and designers (Interactive Technologies)
Although recognized as a key to the design process, prototyping often falls victim to budget cuts, deadlines, or lack of access to sophisticated tools. This can lead to sloppy and ineffective prototypes or the abandonment of them altogether. Rather than lose this important step, people are turning to Microsoft Excel® to create effective,...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy