Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Statistics Using SPSS, STATISTICA, MATLAB and R
Applied Statistics Using SPSS, STATISTICA, MATLAB and R
From the reviews:

"Aimed at students, professionals and research workers who need to apply statistical analysis to a large variety of practical problems using SPSS, MATLAB and STATISTICA, this book provides a comprehensive coverage of the main statistical analysis topics … . The relevant notions and methods are explained concisely,...

The Economics of Speed: Machine Speed as the Key Factor in Productivity (Lecture Notes in Production Engineering)
The Economics of Speed: Machine Speed as the Key Factor in Productivity (Lecture Notes in Production Engineering)

This is the first book to examine the “nuts and bolts” of production processes. It proposes a truly consilient approach to modeling production processes – one that goes beyond the vague principles found in standard economics – and provides details that are consistent with the applied mechanics and engineering...

Information Systems Development: Asian Experiences
Information Systems Development: Asian Experiences

Information Systems Development (ISD) progresses rapidly, continually creating new challenges for the professionals involved. New concepts, approaches and techniques of systems development emerge constantly in this field. Progress in ISD comes from research as well as from practice.

This conference will discuss issues pertaining to...

Current Security Management & Ethical Issues of Information Technology
Current Security Management & Ethical Issues of Information Technology
This scholarly examination of the ethical issues in information technology management covers basic details such as improving user education and developing security requirements as well as more complicated and far-reaching problems.

Corporate and individual behaviors are increasingly publicized as reports of scandals around the world are...

Managing Globally with Information Technology
Managing Globally with Information Technology

As the world economy becomes more interdependent and competition for business continues to be more globally oriented, it has become necessary to address the issues of IT management from a broader global focus. Information technology is not only the enabler of the global marketplace but also a potential solution base for achieving global...

Hands-On Enterprise Java Microservices with Eclipse MicroProfile: Build and optimize your microservice architecture with Java
Hands-On Enterprise Java Microservices with Eclipse MicroProfile: Build and optimize your microservice architecture with Java

An effective guide to designing, building, and deploying enterprise Java microservices with Eclipse MicroProfile

Key Features

  • Create cloud-native microservices with ease using this detailed guide
  • Avoid vendor lock-in when implementing microservices using Eclipse...
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)
Digitalization Cases: How Organizations Rethink Their Business for the Digital Age (Management for Professionals)

This book presents a rich compilation of real-world cases on digitalization, the goal being to share first-hand insights from respected organizations and to make digitalization more tangible. As virtually every economic and societal sector is now being challenged by emerging technologies, the digital economy is a highly...

Manage IT!: Organizing IT Demand and IT Supply
Manage IT!: Organizing IT Demand and IT Supply
"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involved are quite ‘classical’, such as Fourier analysis and differential equations. In fact, a great deal of...
Between Crown and Commerce: Marseille and the Early Modern Mediterranean (The Johns Hopkins University Studies in Historical and Political Science)
Between Crown and Commerce: Marseille and the Early Modern Mediterranean (The Johns Hopkins University Studies in Historical and Political Science)

Between Crown and Commerce examines the relationship between French royal statecraft, mercantilism, and civic republicanism in the context of the globalizing economy of the early modern Mediterranean world.

This is the story of how the French Crown and local institutions accommodated one another as they sought to forge...

Broadband Internet: Access, Regulation and Policy
Broadband Internet: Access, Regulation and Policy
The internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current...
unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy