Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Development Handbook
Software Development Handbook
This Second Edition of the Software Development Handbook has been extensively revised and updated to incorporate new developments, and to improve and clarify the presentation.

This handbook is not intended as a complete course in software development for microcomputers. However, witb appropriate additional material and combined with
...
Research Methods in Legal Translation and Interpreting: Crossing Methodological Boundaries (Law, Language and Communication)
Research Methods in Legal Translation and Interpreting: Crossing Methodological Boundaries (Law, Language and Communication)

The field of Legal translation and interpreting has strongly expanded over recent years. As it has developed into an independent branch of Translation Studies, this book advocates for a substantiated discussion of methods and methodology, as well as knowledge about the variety of approaches actually applied in the field. It is argued...

Getting Started with SAS Activity-Based Management 6.4, Second Edition
Getting Started with SAS Activity-Based Management 6.4, Second Edition
This document introduces basic modeling concepts that are used in SAS Activity-Based Management software. To complete the model-building process, move through this tutorial from beginning to end, exactly as it is presented. This tutorial also provides information that helps you become familiar with the SAS Activity-Based Management software: the...
Perl Medic : Transforming Legacy Code
Perl Medic : Transforming Legacy Code
Bring new power, performance, and scalability to your existing Perl code!

Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of...

Gender in International Relations
Gender in International Relations
As a scholar and teacher of international relations, I have frequently asked myself the following questions: Why are there so few women in my discipline? If I teach the field as it is conventionally defined, why are there so few readings by women to assign to my students? Why is the subject matter of my discipline so distant from women's lived...
Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)
Queueing Networks: A Fundamental Approach (International Series in Operations Research & Management Science)

The origin of queueing theory and its application traces back to Erlang’s historical work for telephony networks as recently celebrated by the Erlang Centennial, 100 Years of Queueing, Copenhagen, recalling his first paper in 1909. Ever since, the simplicity and fundamental flavour of Erlang’s famous expressions, such as his...

Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Designing Mobile Service Systems (Research in Design Series)
Designing Mobile Service Systems (Research in Design Series)
This book is the second in the Research in Design series. Design is an effort that enjoys a growing attention in the academic world. At Delft University of Technology design is a recognized part of science. Like other technical universities, Delft is rooted in the engineering field. And in spite of questions like ‘what is design’,...
ESD : RF Technology and Circuits
ESD : RF Technology and Circuits
The phenomenon of electrostatic discharge (ESD) has been known for a long time, but recently a growing interest has been observed in ESD in radio frequency (RF) technology and ESD issues in RF applications.

Why now?

Early telecommunications started with William Cooke and Charles Wheatstone in the development of the electric
...
Object-Oriented Behavioral Specifications
Object-Oriented Behavioral Specifications

Object-Oriented Behavioral Specifications encourages builders of complex information systems to accelerate their move to using the approach of a scientific discipline in analysis rather than the approach of a craft. The focus is on understanding customers' needs and on precise specification of understanding gained through analysis....

Introduction to Supercritical Fluids, Volume 4: A Spreadsheet-based Approach (Supercritical Fluid Science and Technology)
Introduction to Supercritical Fluids, Volume 4: A Spreadsheet-based Approach (Supercritical Fluid Science and Technology)

This text provides an introduction to supercritical fluids with easy-to-use Excel spreadsheets suitable for both specialized-discipline (chemistry or chemical engineering student) and mixed-discipline (engineering/economic student) classes. Each chapter contains worked examples, tip boxes and end-of-the-chapter problems and projects.

...

How to Program Using C++
How to Program Using C++
Welcome to a book about learning to program.

Before we go any further, you need to be absolutely clear about what it is that you are holding in your hand. This is possibly a book with the name of a programming language in the title that is unlike any book with the name of a programming language in the title that you have encountered
...
unlimited object storage image
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy