Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Everyone Needs a Mentor: Fostering Talent in Your Organisation
Everyone Needs a Mentor: Fostering Talent in Your Organisation
Mentoring is the most cost-efficient and sustainable method of developing talent within an organization. This book shows how set up, run and maintain a mentoring program, from selecting and matching mentors and mentees to measuring results.

You can use mentoring to: stretch talented employees to perform even better by exposure to high
...
Hypertension Primer: The Essentials of High Blood Pressure
Hypertension Primer: The Essentials of High Blood Pressure
We are delighted to bring you the Hypertension Primer, Third Edition, a decade after the First Edition was launched. Given the breadth and depth of information available in the continuously expanding field of hypertension, our Primer remains a...
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

The NURBS Book (Monographs in Visual Communication)
The NURBS Book (Monographs in Visual Communication)

The second, revised edition of this book covers all aspects of non-uniform rational B-splines necessary to design geometry in a computer-aided environment. Basic B-spline features, curve and surface algorithms, and state-of-the-art geometry tools are all discussed. Detailed code for design algorithms and computational tricks are covered, too,...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Prostate Cancer (Recent Results in Cancer Research, Vol. 175)
Prostate Cancer (Recent Results in Cancer Research, Vol. 175)

This comprehensive and easy-to-read monograph is an authoritative update on clinical prostate cancer. It has been prepared by an international, multidisciplinary team at the invitation of the International Prostate Health Council think tank. A particular strength of the book is its presentation of the therapeutic options for patients with...

Sparc Architecture, Assembly Language Programming, and C
Sparc Architecture, Assembly Language Programming, and C
  • Provides reader understanding of the complexity and cost of using various data and control structures in high-level languages
  • Includes the latest material on the new Ultra SPARC architecture
  • Frequent references to C and C++ language constructs and their translation into SPARC assembly language
  • ...
System Requirements Analysis, Second Edition
System Requirements Analysis, Second Edition

System Requirements Analysis gives the professional systems engineer the tools to set up a proper and effective analysis of the resources, schedules and parts needed to successfully undertake and complete any large, complex project. This fully revised text offers readers the methods for rationally breaking down a large project into a...

A Practical Guide to the Wiring Regulations
A Practical Guide to the Wiring Regulations

The Third Edition has been updated to take account of the 2001 amendments to the Wiring Regulations, including revisions on:

- protection against overcurrent

- isolation and switching

- zoning requirements for locations containing a bath or shower

- construction site installations

-...

Computer System Performance Modeling in Perspective: A Tribute to the Work of Professor Kenneth C. Sevcik
Computer System Performance Modeling in Perspective: A Tribute to the Work of Professor Kenneth C. Sevcik
This book is a tribute to the many contributions that Kenneth C. Sevcik made both as a scholar, and a mentor to numerous young researchers, that was planned on the occasion of his 60th birthday. The project for the book was launched at the end of 2004. Unfortunately it only appears in print after his untimely death due to delays in bringing...
At War with the Weather: Managing Large-Scale Risks in a New Era of Catastrophes
At War with the Weather: Managing Large-Scale Risks in a New Era of Catastrophes
The United States and other nations are facing large-scale risks at an accelerating pace. In 2005, three major hurricanes—Katrina, Rita, and Wilma—made landfall along the U.S. Gulf Coast within an eight-week period. The damage caused by these storms led to insurance reimbursements and federal disaster relief of more than $180...
Guide to Advanced Empirical Software Engineering
Guide to Advanced Empirical Software Engineering
Empirical studies have become an integral element of software engineering research and practice. This unique text/reference includes chapters from some of the top international empirical software engineering researchers and focuses on the practical knowledge necessary for conducting, reporting and using empirical methods in software engineering....
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy