 |
|
 The Easy Guide to Repertory GridsThis book is the result of some experiences I’ve had during the last 10 years, teaching repertory grid technique to a variety of audiences. There have been two main kinds of trainee. The first has comprised my direct students at Luton Graduate Business School, managers studying for MBA and MSc degrees on a part-time basis, and young graduates... |  |  |  |  |
|
 Accident And Design: Contemporary Debates On Risk Management“Four chapters good, two chapters bad” (with apologies to George Orwell) appears to have been orthodoxy’s response to the 1992 [British] Royal Society publication, Risk: analysis, perception and mana ement. The “good” four chapters were those written by distinguished engineers,... |  |  Adobe Photoshop Elements 3.0: Photographers' GuideThere’s a reason why digital camera icons abound in the splash screens and introductory views of the brand new Photoshop Elements 3.0. Digital photography and Elements were made for each other. However, whether you’re using a digital pixel-grabber or a conventional film camera, Adobe’s revamped easy-to-use image editor has the... |  |  Domesday: The Inquest and the BookDomesday Book is the oldest and most precious of the public records, but historians still disagree on its purpose. In arguing that the writing of Domesday Book was no part of the Domesday survey, this book proposed a solution to a riddle that will change our perception of the Norman Conquest and Norman kingship.
EVERYONE HAS HEARD of... |
|
 Practicing Software Engineering in the 21st CenturyThis technological manual explores how software engineering principles can be used in tandem with software development tools to produce economical and reliable software that is faster and more accurate. Tools and techniques provided include the Unified Process for GIS application development, service-based approaches to business and information... |  |  Sexual Murder: Catathymic and Compulsive HomicideDuring graduate school, I had planned on a career in professional psychology with an emphasis on evaluating and treating children and adolescents. After a 2-year traineeship at a state hospital, I was ready to begin my clinical internship at the New Jersey Neuropsychiatric Institute in Princeton. Due to an administrative snafu, however, I was... |  |  Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |
|
 Software Project Secrets: Why Software Projects FailPreviously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the... |  |  RF Mems Circuit Design for Wireless CommunicationsThis book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable... |  |  The Healthy PC: Preventive Care and Home Remedies for Your ComputerKeep Your PC Running Smoothly--Without Spending a Lot of Money!
Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely... |
|
| Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 |