Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Structures and Their Algorithms
Data Structures and Their Algorithms

Like all engineering activities, computer programming is both craft and science. Building a bridge or a computer program requires familiarity with the known techniques for the overall design of similar artifacts. And making intelligent choices among the available techniques and designs requires understanding of the mathematical principles...

The Neurobiological Basis of Suicide (Frontiers in Neuroscience)
The Neurobiological Basis of Suicide (Frontiers in Neuroscience)

With recent studies using genetic, epigenetic, and other molecular and neurochemical approaches, a new era has begun in understanding pathophysiology of suicide. Emerging evidence suggests that neurobiological factors are not only critical in providing potential risk factors but also provide a promising approach to develop more effective...

Professional Linux Programming
Professional Linux Programming
By tapping the strengths of the open-source movement, developers can write custom Linux software without spending a dime on licensing fees. Aimed at the experienced C/C++ programmer, Professional Linux Programming provides a wide-ranging and hands-on guide to the different pieces of the puzzle that are required to program successfully...
Better Green Business: Handbook for Environmentally Responsible and Profitable Business Practices
Better Green Business: Handbook for Environmentally Responsible and Profitable Business Practices

Better Green Business brings together practical insights and start-to-finish strategies for moving any enterprise to a higher level of environmental stewardship. Drawing on his extensive experience from working across industries and functional boundaries, Dr. Eric G. Olson shows how to systematically...

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)
Platelets and Megakaryocytes: Volume 1: Functional Assays (Methods in Molecular Biology)

12 The average human body has in the order of 10 circulating platelets. They are crucial for hemostasis, and yet excessive platelet activation is a major cause of m- bidity and mortality in western societies. It is therefore not surprising that platelets have become one of the most extensively investigated biological cell types. We are,...

CCDP: Cisco Internetwork Design Study Guide
CCDP: Cisco Internetwork Design Study Guide
Looking to advance your career as a network designer or integrator? Here's the study guide you need to prepare for the Cisco Internetwork Design exam, the final step in the Cisco Certified Design Professional program. With full coverage of each Cisco exam objective, this study guide delivers the goods on crucial design issues--from CANs, MANs, and...
Business Analysis: Microsoft Excel 2010 (MrExcel Library)
Business Analysis: Microsoft Excel 2010 (MrExcel Library)

USE EXCEL 2010 TO GAIN DEEPER INSIGHTS, MAKE SMARTER DECISIONS, AND EARN MORE PROFITS

 

Using real-world examples, Carlberg helps you put Excel’s features and functions to work and get the power of quantitative analysis behind your management...

Visualization Handbook, First Edition
Visualization Handbook, First Edition
The field of visualization is focused on creating images that convey salient information about
underlying data and processes. In the past three decades, the field has seen unprecedented
growth in computational and acquisition technologies,
which has resulted in an increased ability both to sense the physical world with
very
...
Troubleshooting Campus Networks: Practical Analysis of Cisco and LAN Protocols
Troubleshooting Campus Networks: Practical Analysis of Cisco and LAN Protocols
Essential information on the successful troubleshooting of complex campus networks

Just as a used car can seem to be in good condition to an inexperienced consumer, a network can also feign an appearance that all is running smoothly to the unskilled user. Upon closer examination, though, a true expert can discern when a network is
...
Irish Imperial Networks: Migration, Social Communication and Exchange in Nineteenth-Century India
Irish Imperial Networks: Migration, Social Communication and Exchange in Nineteenth-Century India

This is an innovative study of the role of Ireland and the Irish in the British Empire which examines the intellectual, cultural and political interconnections between nineteenth-century British imperial, Irish and Indian history. Barry Crosbie argues that Ireland was a crucial sub-imperial centre for the British Empire in South Asia that...

Content Manager Backup/Recovery and High Availability: Strategies, Options, and Procedures (IBM Redbooks)
Content Manager Backup/Recovery and High Availability: Strategies, Options, and Procedures (IBM Redbooks)

Structured and unstructured data is constantly growing, data retention requirements and user access requirements are continuously changing, and the demand for the readiness and availability of business systems and data becomes even higher. The use of content management systems is vital and necessary; it is what makes an organization's success...

unlimited object storage image
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy