Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager

The humor and insights in the 2nd Edition of Managing Humans are drawn from Michael Lopp's management experiences at Apple, Netscape, Symantec, and Borland, among others. This book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other and occasionally throw...

Magnonics: From Fundamentals to Applications (Topics in Applied Physics)
Magnonics: From Fundamentals to Applications (Topics in Applied Physics)

Spin waves (and their quanta magnons) can effectively carry and process information in magnetic nanostructures. By analogy to photonics, this research field is labelled magnonics. It comprises the study of excitation, detection, and manipulation of magnons. From the practical point of view, the most attractive feature of magnonic devices is...

Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

Field Archaeology from Around the World: Ideas and Approaches (SpringerBriefs in Archaeology)
Field Archaeology from Around the World: Ideas and Approaches (SpringerBriefs in Archaeology)

Field practice in archaeology varies greatly throughout the world, mainly because archaeological sites survive in very different ways in different counties.  Many manuals see this as a problem - to be defeated by the imposition of standardised procedures.  In this book we relish the variety of field practice, seeing it rather as the...

Protecting Networks with SATAN
Protecting Networks with SATAN

SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of...

Arduino Electronics Blueprints
Arduino Electronics Blueprints

Make common electronic devices interact with an Arduino board to build amazing out-of-the-box projects

About This Book

  • Build interactive electronic devices using the Arduino
  • Learn about web page, touch sensor, Bluetooth, and infrared controls
  • A project-based guide to create...
Cocos2d-X Game Development Blueprints
Cocos2d-X Game Development Blueprints

Build a plethora of games for various genres using one of the most powerful game engines, Cocos2d-x

About This Book

  • Explore the powerful features of Cocos2d-x and use them to your advantage
  • Tackle commonly faced problems while creating popular 2D games
  • A step-by-step guide...
Porous Silicon for Biomedical Applications (Woodhead Publishing Series in Biomaterials)
Porous Silicon for Biomedical Applications (Woodhead Publishing Series in Biomaterials)

Porous silicon has a range of properties, making it ideal for drug delivery, cancer therapy, and tissue engineering. Porous Silicon for Biomedical Applications provides a comprehensive review of this emerging nanostructured and biodegradable biomaterial.

Chapters in part one focus on the fundamentals and properties of porous...

Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)
Data Matching: Concepts and Techniques for Record Linkage, Entity Resolution, and Duplicate Detection (Data-Centric Systems and Applications)

Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...

Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Discover how to detect fraud, biases, or errors in your data using Access or Excel

With over 300 images, Forensic Analytics reviews and shows how twenty substantive and rigorous tests can be used to detect fraud, errors, estimates, or biases in your data. For each test, the original data is shown with the steps needed to get to the...

Why Do Clocks Run Clockwise? And Other Imponderables
Why Do Clocks Run Clockwise? And Other Imponderables

Here are the answers to questions that have been keeping you and your loved ones up nights, questions that have driven families to feuds, questions that nag and nag just won't let go. Have you ever wondered juts what purpose those warning labels on mattresses are supposed to serve? Or what happens to the trend that wears off tires? And...

Feature Extraction & Image Processing for Computer Vision, Third Edition
Feature Extraction & Image Processing for Computer Vision, Third Edition

This book is an essential guide to the implementation of image processing and computer vision techniques, with tutorial introductions and sample code in Matlab. Algorithms are presented and fully explained to enable complete understanding of the methods and techniques demonstrated. As one reviewer noted, "The main strength of the...

Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy