Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Questionnaire Design, Development, Evaluation and Testing
Advances in Questionnaire Design, Development, Evaluation and Testing

A new and updated definitive resource for survey questionnaire testing and evaluation

Building on the success of the first Questionnaire Development, Evaluation, and Testing (QDET) conference in 2002, this book brings together leading papers from the Second International Conference on Questionnaire Design,...

Practical Data Mining
Practical Data Mining

Used by corporations, industry, and government to inform and fuel everything from focused advertising to homeland security, data mining can be a very useful tool across a wide range of applications. Unfortunately, most books on the subject are designed for the computer scientist and statistical illuminati and leave the reader largely...

Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Bitcoin for the Befuddled
Bitcoin for the Befuddled

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.

But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions...

Complex Enterprise Architecture: A New Adaptive Systems Approach
Complex Enterprise Architecture: A New Adaptive Systems Approach
Implement successful and cost-effective enterprise architecture projects. This book provides a new approach to developing enterprise architecture based on the idea of emergent behaviors?where instead of micromanaging system implementation, the enterprise architecture effort establishes clear goals and leaves the details to the...
Linked Data: Structured Data on the Web
Linked Data: Structured Data on the Web

Summary

Linked Data presents the Linked Data model in plain, jargon-free language to Web developers. Avoiding the overly academic terminology of the Semantic Web, this new book presents practical techniques, using everyday tools like JavaScript and Python.

About this Book

...

Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Result Page: 79 78 77 76 75 74 73 72 71 70 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy