Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Credible Checklists and Quality Questionnaires: A User-Centered Design Method
Credible Checklists and Quality Questionnaires: A User-Centered Design Method

Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method.

In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking questions (and designing questionnaires) is a...

The Zend PHP Certification Practice Test Book - Practice Questions for the Zend Certified Engineer Exam
The Zend PHP Certification Practice Test Book - Practice Questions for the Zend Certified Engineer Exam
As the usage of PHP grows, the need for a globally-recognized credentials program for professional developers is becoming more and more important. The Zend Engineer Certification Program, launched by worldwide PHP leader Zend Technologies, finally creates a professional designation that represents consistently high-quality skills and knowledge in...
Semantic Web Services: Theory, Tools and Applications
Semantic Web Services: Theory, Tools and Applications
Semantic Web is here to stay! This is not really a marketing campaign logo, but it is a truth that every year is becoming more and more relevant to the daily life of business world, industry and society. I do not know how it happened, but the last years, through our activities in the Special Interest Group on Semantic Web and Information Systems in...
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Emotional Intelligence in Action: Training and Coaching Activities for Leaders, Managers, and Teams
Emotional Intelligence in Action: Training and Coaching Activities for Leaders, Managers, and Teams

The importance of emotional intelligence as a critical factor in personal and business success is now well established. Emotional Intelligence in Action, Second Edition shows how to tap the power of EI to build effective emotional skills and create real change for leaders and teams.

This book breaks new ground in providing a...

Design and Analysis of Spiral Inductors
Design and Analysis of Spiral Inductors

The book addresses the critical challenges faced by the ever-expanding wireless communication market and the increasing frequency of operation due to continuous innovation of high performance integrated passive devices. The challenges like low quality factor, design complexity, manufacturability, processing cost, etc., are studied with...

Nursing Health Assessment: A Critical Thinking, Case Studies Approach
Nursing Health Assessment: A Critical Thinking, Case Studies Approach

Learn, Do, and Think! Experience the Dillon Difference – engage your students in the assessment process! Throughout the text, you will find a unique body system integration, case studies strategically placed three times in each chapter, and critical thinking questions. Dillion...

Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
Understanding the LINUX Kernel: From I/O Ports to Process Management
Understanding the LINUX Kernel: From I/O Ports to Process Management
Understanding the Linux Kernel helps readers understand how Linux performs best and how
it meets the challenge of different environments. The authors introduce each topic by
explaining its importance, and show how kernel operations relate to the utilities that are
familiar to Unix programmers and users.

The idea was to
...
Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
How to Design Programs: An Introduction to Programming and Computing
How to Design Programs: An Introduction to Programming and Computing
This introduction to programming places computer science in the core of a liberal arts education. Unlike other introductory books, it focuses on the program design process. This approach fosters a variety of skills--critical reading, analytical thinking, creative synthesis, and attention to detail - that are important for everyone, not just future...
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Fingerprints and Other Ridge Skin Impressions (International Forensic Science and Investigation Series)
Our aim with this book was to place, under the same roof, two distinct but intertwined aspects of the use of fingerprinting for personal identification and criminal investigation: (1) the aspects associated with the visualization, detection, and recording of friction ridge skin impressions and (2) the issues regarding the identification or...
unlimited object storage image
Result Page: 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy