Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Early Computing in Britain: Ferranti Ltd. and Government Funding, 1948 ? 1958 (History of Computing)
Early Computing in Britain: Ferranti Ltd. and Government Funding, 1948 ? 1958 (History of Computing)

This unique book presents the story of the pioneering manufacturing company Ferranti Ltd. – producer of the first commercially-available computers – and of the nine end-user organisations who purchased these machines with government help in the period 1951 to 1957. The text presents personal reminiscences from many of the...

Anti-System Parties: From Parliamentary Breakthrough to Government (Extremism and Democracy)
Anti-System Parties: From Parliamentary Breakthrough to Government (Extremism and Democracy)

This book adopts an innovative conceptualization and analytical framework to the study of anti-system parties, and represents the first monograph ever published on the topic. It features empirical research using original data and combining large-N QCA analyses with a wide range of in-depth case studies from 18 Western European...

Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Rethinking Young People’s Marginalisation: Beyond neo-Liberal Futures? (Youth, Young Adulthood and Society)
Rethinking Young People’s Marginalisation: Beyond neo-Liberal Futures? (Youth, Young Adulthood and Society)

In the 21st century myriad earth systems – atmospheric systems, ocean systems, land systems, neo-Liberal capitalism – are in crisis. These crises are deeply related. Taking diverse and multiple forms, they have diverse and multiple consequences and are evidenced in such things as war, everyday violence, hate and...

Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Hyperspectral Imaging: Techniques for Spectral Detection and Classification
Hyperspectral Imaging: Techniques for Spectral Detection and Classification

Hyperspectral Imaging: Techniques for Spectral Detection and Classification is an outgrowth of the research conducted over the years in the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County. It explores applications of statistical signal processing to hyperspectral...

Principles of Data Integration
Principles of Data Integration

How do you approach answering queries when your data is stored in multiple databases that were designed independently by different people? This is first comprehensive book on data integration and is written by three of the most respected experts in the field.

This book provides an extensive introduction to the theory and concepts...

Engineering Science, Fifth Edition
Engineering Science, Fifth Edition
The most comprehensive engineering science text available - fully in line with the latest pre-degree course requirements

. Generic topic-based approach - ensures suitability for all vocational and pre-degree level students
. Coverage of all the mechanical, electrical and electronic principles
...
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
This book is a third-party evaluation of H1N1 prevention and control effects in China. Based on the characteristic of H1N1 pandemic around the world and current public health management system in China, this book evaluates the comprehensive effects by considering the countermeasures, joint prevent and control mechanism operated by central and...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Result Page: 82 81 80 79 78 77 76 75 74 73 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy