Home | Amazing | Today | Tags | Publishers | Years | Search 
Quantum Enigma: Physics Encounters Consciousness
Quantum Enigma: Physics Encounters Consciousness
The most successful theory in all of science--and the basis of one third of our economy--says the strangest things about the world and about us. Can you believe that physical reality is created by our observation of it? Physicists were forced to this conclusion, the quantum enigma, by what they observed in their laboratories.

Trying to
...
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Killer Web Content: Make the Sale, Deliver the Service, Build the Brand
Killer Web Content: Make the Sale, Deliver the Service, Build the Brand
"Genius! Gerry McGovern gets it! If you read one book on managing a website, this is it. A must read for any web manager in any organization, large or small, government or private."-Bev Godwin, director of FirstGov.gov

Written by an internationally acclaimed specialist in this field, Killer Web Content provides the strategies...

Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
100 Strangest Mysteries
100 Strangest Mysteries
THE BEAST OF BODMIN: whether it is a native cat, previously thought extinct, or an escaped exotic pet, the Beast of Bodmin is a creature that refuses to disappear. Indeed, sightings of the panther-like creature continue apace and, unlike other mysterious beasts, modern technology is actually helping to prove its existence. Bodmin Moor is an area of...
Mobile Internet For Dummies (Computer/Tech)
Mobile Internet For Dummies (Computer/Tech)

Stay informed, entertained, and up to date — anywhere!

Discover the mobile Internet and surf, shop, blog, watch videos, and more!

When it comes to the Internet, you CAN take it with you! This book is packed with tips on choosing the best mobile device, software, and service...

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
A Dictionary of Law (Oxford Paperback Reference)
A Dictionary of Law (Oxford Paperback Reference)
This dictionary has been written by a distinguished team of academic and practising lawyers. It is intended primarily for those without a qualification in law who nevertheless require some legallmowledge in the course oftheir work: chartered surveyors and accountants, civil servants and local-government officers, social workers and probation...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Designing Effective Web Surveys
Designing Effective Web Surveys
Designing Effective Web Surveys is a practical guide to designing Web surveys, based on empirical evidence and grounded in scientific research and theory. It is designed to guide survey practitioners in the art and science of developing and deploying successful Web surveys. It is not intended as a "cook book"; rather it is meant to get...
MIMO Radar Signal Processing
MIMO Radar Signal Processing
Multiple-Input Multiple-Output (MIMO) radar has been receiving increasing attention from researchers, practitioners, and funding agencies. This is the first book to present a comprehensive and coherent picture of this emerging field, which is likely to become the standard reference in the field. The book introduces recent developments in MIMO radar...
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy