Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Signals and Systems using MATLAB
Signals and Systems using MATLAB
Although it is hardly possible to keep up with advances in technology, it is reassuring to know that in science and engineering, development and innovation are possible through a solid understanding of basic principles. The theory of signals and systems is one of those fundamentals, and it will be the foundation of much research and...
Gambling Disorder
Gambling Disorder

This book provides an overview of the state of the art in research on and treatment of gambling disorder. As a behavioral addiction, gambling disorder is of increasing relevance to the field of mental health. Research conducted in the last decade has yielded valuable new insights into the characteristics and etiology of gambling...

Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and...
Handbook of Constraint Programming (Foundations of Artificial Intelligence)
Handbook of Constraint Programming (Foundations of Artificial Intelligence)
This encyclopedic work covers twenty-plus years of research in constraint programming in a readable, accessible and appealing way. For someone outside the field wondering what Constraint Programming is all about, this is the perfect introduction, and the book will remain useful as a reference for years.
Michael Trick, Professor of Operations
...
Programming the iPhone User Experience
Programming the iPhone User Experience
Apple's iPhone and iPod Touch not only feature the world's most powerful mobile operating system, they also usher in a new standard of human-computer interaction through gestural interfaces and multi-touch navigation. This book provides you with a hands-on, example-driven tour of UIKit, Apple's user interface toolkit, and includes common design...
eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)
eMarketing eXcellence, Third Edition: Planning and optimising your digital marketing (Emarketing Essentials)

E-marketing impacts all aspects of marketing from strategy and planning through the marketing mix, marketing communications and buyer behaviour to marketing research. eMarketing eXcellence highlights the most significant opportunities, pitfalls and defines the new marketing approaches needed. It highlights best practice in applying digital...

Microsoft SQL Server 2008 R2 Administration Cookbook
Microsoft SQL Server 2008 R2 Administration Cookbook

Most books about SQL Server take one of the two approaches. The first approach is to provide a broad introduction to SQL Server administration. While overviews are great for beginners, they don't provide enough information, leaving the reader wanting for details and practical advice. The second approach is to attempt to cover every...

Jenkins Continuous Integration Cookbook
Jenkins Continuous Integration Cookbook
Jenkins is a Java-based Continuous Integration (CI) server that supports the discovery of defects early in the software cycle. Thanks to over 400 plugins, Jenkins communicates with many types of systems, building and triggering a wide variety of tests.

CI involves making small changes to software, and then building and
...
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Enterprise Risk Management: From Incentives to Controls
Enterprise Risk Management: From Incentives to Controls

A fully revised second edition focused on the best practices of enterprise risk management

Since the first edition of Enterprise Risk Management: From Incentives to Controls was published a decade ago, much has changed in the worlds of business and finance. That's why James Lam has returned with a new edition of...

Docker Bootcamp
Docker Bootcamp

Fast, intensive, and effective Docker learning

About This Book

  • Get well-versed with Docker in 7 days
  • Identify and resolve common problems faced by users while working with Docker
  • A fast-paced guide that will focus on all the core Docker functionalities

...

unlimited object storage image
Result Page: 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy