Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Besieged: An Encyclopedia of Great Sieges From Ancient Times To The Present
Besieged: An Encyclopedia of Great Sieges From Ancient Times To The Present
Civilization began with the creation of cities, the congregation of people for mutual support. By their very decision to assemble and collect resources, cities became targets for raiding populations that found taking someone else’s possessions easier than producing their own. The need for defense meant that the towns soon built walls around...
Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation
Handbook of Natural Language Processing and Machine Translation: DARPA Global Autonomous Language Exploitation

This comprehensive handbook, written by leading experts in the field, details the groundbreaking research conducted under the breakthrough GALE program--The Global Autonomous Language Exploitation within the Defense Advanced Research Projects Agency (DARPA), while placing it in the context of previous research in the fields of natural...

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)
Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)

Features a comprehensive summary of the chemical, physiological, and nutritional relationships of all recognized vitamins!

Maintaining the standards of excellence set forth in the previous editions, the Handbook of Vitamins, Third Edition presents a thorough examination of the fundamental characteristics, functions, and roles
...

SPSS For Dummies (Computer/Tech)
SPSS For Dummies (Computer/Tech)
Program SPSS with Python® and Command Syntax

The fun and easy way® to generate solid decision-making results with SPSS

Stymied by SPSS? This friendly, plain-English guide gets you up and running with the latest version of the software so that you can start performing calculations...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Intelligent Complex Adaptive Systems
Intelligent Complex Adaptive Systems
I don’t believe in the existence of a complex systems theory as such and, so far, I’m still referring to complex systems science (CSS) in order to describe my research endeavours. In my view, the latter is constituted, up until now, by a bundle of loosely connected methods and theories aiming to observe— from...
The Complement System: Novel Roles in Health and Disease
The Complement System: Novel Roles in Health and Disease

As a phylogenetically old system complement is now regarded as a part of innate immunity. But it is much more than that. It bridges innate and adapted immunity, participates not only in host defense but also in many essential physiological processes, old and new diseases and adverse conditions. Indeed, complement became a term that almost...

How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
Applied Software Product Line Engineering
Applied Software Product Line Engineering

Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries. Detailing the various aspects of SPLE implementation in different domains, Applied Software Product Line Engineering documents best...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy