Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile!: The Good, the Hype and the Ugly
Agile!: The Good, the Hype and the Ugly

Are you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: the first exhaustive, objective review of agile principles, techniques and tools.

...

International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)

This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodologies in communication technologies and...

Six Sigma and Beyond: Statistics and Probability, Volume III
Six Sigma and Beyond: Statistics and Probability, Volume III
This text explains the tools of statistics and how to apply them effectively to improve processes and profitability in an organization, and also delineates the importance of collecting, analyzing, and interpreting data.

Researchers and professionals in all walks of life need to use the many tools offered by the statistical world, but...

Introduction to ATM/IP Design and Performance with Applications Analysis Software
Introduction to ATM/IP Design and Performance with Applications Analysis Software
Many engineers and students experience difficulty in making sense of issues associated with IP and ATM teletraffic techniques. This is partly because of the subject itself: networks are flexible, complicated, and still evolving. However, some of the difficulties arise because of the advanced mathematical methods that have been applied to provide...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Swarm Intelligent Systems (Studies in Computational Intelligence)
Swarm Intelligent Systems (Studies in Computational Intelligence)
This volume offers a wide spectrum of sample works developed in leading research throughout the world about innovative methodologies of swarm intelligence and foundations of engineering swarm intelligent systems as well as applications and interesting experiences using the particle swarm optimisation. Swarm intelligence is an innovative...
Basics of CMOS Cell Design (Professional Engineering)
Basics of CMOS Cell Design (Professional Engineering)
Design and Simulate Any Type of CMOS Circuit!

Electronic circuit designers and electronic engineering students can turn to Basics of CMOS Cell Design for a practice-based introduction to the design and simulation of every major type of CMOS (complementary metal oxide semiconductor) integrated circuit.

You will...

Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
Reflections on the Teaching of Programming: Methods and Implementations (Lecture Notes in Computer Science)
This state-of-the-art survey, reflecting on the teaching of programming, has been written by a group of primarily Scandinavian researchers and educators with special interest and experience in the subject of programming. The 14 chapters - contributed by 24 authors - present practical experience gathered in the process of teaching programming and...
Introduction to Chemical Engineering Kinetics & Reactor Design
Introduction to Chemical Engineering Kinetics & Reactor Design
One feature that distinguishes the education of the chemical engineer from that of other engineers is an exposure to the basic concepts of chemical reaction kinetics and chemical reactor design. This textbook provides a judicious introductory level overview of these subjects. Emphasis is placed on the aspects of chemical kinetics and material and...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Intelligent Positioning: GIS-GPS Unification
Intelligent Positioning: GIS-GPS Unification
Satellite positioning and computerised spatial data have transformed the way in which many areas of research and commercial activity are conducted. The combination of GIS and GPS is used for a broad spectrum of experiments.

This book provides technical overview of GIS, GPS and their integration, before focusing on a selection of R&D...

Ubuntu on a Dime: The Path to Low-Cost Computing (Path to Low Cost Computing)
Ubuntu on a Dime: The Path to Low-Cost Computing (Path to Low Cost Computing)
You know that Ubuntu software costs nothing. Now you want the PC system that costs as little as possible and runs Ubuntu and OS applications without complaints and calls to tech support.

So you spend your hard–earned dollars on the hardware only and have your own optimized Ubuntu PC. This is the book that will show you how to get what you...

unlimited object storage image
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy