Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beyond the Market: Designing Nonmarket Accounts for the United States
Beyond the Market: Designing Nonmarket Accounts for the United States
One of the long-standing goals of the Committee on National Statistics (CNSTAT) is the improvement of economic measurement and the data sources crucial to that measurement. In working toward that goal, recent CNSTAT panels have produced reports on price and cost-of-living indexes, poverty measurement, measurement of the economy’s government...
Algorithms in Bioinformatics
Algorithms in Bioinformatics

The present volume is dedicated to aspects of algorithmic work in bioinformat ics and computational biology with an emphasis on string algorithms that play a central role in the analysis of biological sequences. The papers included are a selection of articles corresponding to talks given at one of two meetings spon sored by The Royal...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

Software for Your Head: Core Protocols for Creating and Maintaining Shared Vision
Software for Your Head: Core Protocols for Creating and Maintaining Shared Vision

The first publication of the most significant results of the authors' unprecedented five-year investigation into the dynamics of contemporary teams. Will provide a means for any team to create for itself a compelling state of shared vision. Softcover.

We didn’t create The Core.

Instead, we watched it grow. We...

Distributed Source Coding
Distributed Source Coding

Everything a signal and image processing engineer needs to know about distributed source coding - theorems, practical algorithms for design and the latest applications.

The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field,
...

Silverlight 1.0
Silverlight 1.0
Silverlight—the hot new web technology based on the powerful WPF graphics platform that ships with Windows Vista—is the web developer's choice for creating cross-platform interactive applications that work in multiple browsers. This one-of-a-kindreference shows you, with full-color illustrations, how to create rich interactive apps with...
How to Write a Lot: A Practical Guide to Productive Academic Writing
How to Write a Lot: A Practical Guide to Productive Academic Writing

All students and professors need to write, and many struggle to finish their stalled dissertations, journal articles, book chapters, or grant proposals. Writing is hard work and can be difficult to wedge into a frenetic academic schedule. In this practical, light-hearted, and encouraging book, Paul Silvia explains that writing productively...

Data Professionals at Work
Data Professionals at Work
Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today. Data is the hottest word of...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
RESTful Java Web Services Security
RESTful Java Web Services Security

Secure your RESTful applications against common vulnerabilities

About This Book

  • Learn how to use, configure, and set up tools for applications that use RESTful web services to prevent misuse of resources
  • Get to know and fix the most common vulnerabilities of RESTful web services APIs
  • ...
Microsoft Dynamics AX 2012 Security How-To
Microsoft Dynamics AX 2012 Security How-To

Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users' privileges and access rights. Hackers raise their awareness to hack and attack ERP systems as the information becomes the vital weapon these days. So securing your ERP is not only about internal...

Linux for Non-Geeks: A Hands-On, Project-Based, Take-It-Slow Guidebook
Linux for Non-Geeks: A Hands-On, Project-Based, Take-It-Slow Guidebook

This resource is for those who have switched or will be switching to Linux; it avoids tech-talk, but focuses on subjects appealing to the average Joe--installation, playing CDs, the Internet, games, printing, and more.


This book is for any home user who has switched or is thinking of switching to Linux. Based on Red Hat's...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy