Home | Amazing | Today | Tags | Publishers | Years | Search 
Access to Knowledge in the Age of Intellectual Property
Access to Knowledge in the Age of Intellectual Property

At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...

JavaScript Bible
JavaScript Bible

The bestselling JavaScript reference, now updated to reflect changes in technology and best practices

As the most comprehensive book on the market, the JavaScript Bible is a classic bestseller that keeps you up to date on the latest changes in JavaScript, the leading technology for incorporating interactivity into Web...

Construction Databook: Construction Materials and Equipment
Construction Databook: Construction Materials and Equipment

The Construction DataBook, Second Edition, provides the project manager, construction superintendent, design consultants, facility managers and owners with a one-source guide for the most commonly encountered construction materials and equipment.

Composed of eleven sections ranging, in topics, from excavation and sitework to...

Controlled Self-Organisation Using Learning Classifier Systems
Controlled Self-Organisation Using Learning Classifier Systems

The complexity of technical systems increases continuously. Breakdowns and fatal errors occur quite often, respectively. Therefore, the mission of organic computing is to tame these challenges in technical systems by providing appropriate degrees of freedom for self-organised behaviour. Technical systems should adapt to changing requirements...

Constraint Satisfaction Techniques for Agent-Based Reasoning
Constraint Satisfaction Techniques for Agent-Based Reasoning

An important aspect of multi agent systems are agent reasoning techniques for problem solving, either at the level of a single agent or at the level of distributed collaboration amongst multiple agents.

Constraint Satisfaction Problems (CSP) prove to be a generic framework which can be applied for modeling and solving a wide range...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Schema Matching and Mapping (Data-Centric Systems and Applications)
Schema Matching and Mapping (Data-Centric Systems and Applications)

This book provides an overview about the state-of-the-art solutions and the most recent advances in schema matching and mapping, both recognized as key areas of metadata management. Tasks involving metadata are indeed pervasive in databases and information systems and include schema evolution, schema and ontology integration and matching, XML...

CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition)
CMMI for Development®: Guidelines for Process Integration and Product Improvement (3rd Edition)

CMMI® for Development (CMMI-DEV) describes best practices for the development and maintenance of products and services across their lifecycle. By integrating essential bodies of knowledge, CMMI-DEV provides a single, comprehensive framework for organizations to assess their development and maintenance processes and...

Demystifying Embedded Systems Middleware
Demystifying Embedded Systems Middleware

This practical technical guide to embedded middleware implementation offers a coherent framework that guides readers through all the key concepts necessary to gain an understanding of this broad topic. Big picture theoretical discussion is integrated with down-to-earth advice on successful real-world use via step-by-step examples of each type...

CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience
CERT Resilience Management Model (RMM): A Maturity Model for Managing Operational Resilience

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation
Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

PeopleSoft financial applications have been recognized as a leading ERP product across a wide range of industries that help organizations automate their accounting operations, cut costs, and streamline business processes. They offer industry leading solutions for organizations' global needs, however complex they may be.

...

David Busch's Compact Field Guide for the Canon EOS Rebel T3i/600D
David Busch's Compact Field Guide for the Canon EOS Rebel T3i/600D

Throw away your cheat-sheets and command cards! Are you tired of squinting at tiny color-coded tables on fold-out camera cards? Do you wish you had the most essential information extracted from my comprehensive David Busch’s Canon EOS Rebel T3i/600D Guide to Digital SLR Photography in a size you could tuck away in your camera...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy