Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
College Algebra in Context (4th Edition)
College Algebra in Context (4th Edition)
College Algebra in Context is designed for a course in algebra that is based on data analysis, modeling, and real-life applications from the management, life, and social sciences. The...
Programming C#
Programming C#
C# is designed from the ground up for development on Microsoft's new .NET framework. As such, it's a high-performance language that's simple, safe, object-oriented, and Internet-centric. Programming C# teaches this new language in a way that experienced programmers will appreciate--by grounding its applications firmly in the context of...
Beginning SQL Server 2008 for Developers: From Novice to Professional
Beginning SQL Server 2008 for Developers: From Novice to Professional
SQL Server 2008 is a first–rate database management system. It offers more capability than any previous release of SQL Server. More than just a classic relational database management system, SQL Server 2008 includes exciting and powerful features that make it useful for everything from large corporate data warehouses to ad hoc departmental...
Collaborative Design and Learning: Competence Building for Innovation (International Series on Technology Policy and Innovation)
Collaborative Design and Learning: Competence Building for Innovation (International Series on Technology Policy and Innovation)

In today's knowledge-driven economy, the ability to share insight and know-how is essential for driving innovation and growth. In this groundbreaking volume, scholars from around the world demonstrate how communication and information technologies are enabling dynamic project design and management practices that challenge traditional...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
The Doctor in the Victorian Novel
The Doctor in the Victorian Novel

With the character of the doctor as her subject, Tabitha Sparks follows the decline of the marriage plot in the Victorian novel. As Victorians came to terms with the scientific revolution in medicine of the mid-to-late nineteenth century, the novel's progressive distance from the conventions of the marriage plot can be indexed through a rising...

Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
Topgrading, 3rd Edition: The Proven Hiring and Promoting Method That Turbocharges Company Performance
“BRAD HELPED US DEVELOP THE TOOLS TO PICK A-PLAYER LEADERS AT GE.” —JACK WELCH


Great companies, large and small, rise or fall because of their talent; the more high performers on your team, the more successful your organization will be. Of course, that’s easier said than done. Research
...
Hypoplastic Left Heart Syndrome
Hypoplastic Left Heart Syndrome

-No other publication currently available offers such a comprehensive overview of the care required by a child with hypoplasia of the left heart

-Address the needs of the families of children born with this condition, and is the first to includes insight from parents

-Authors are acknowledged world leaders in the...

Computer Models in Biomechanics: From Nano to Macro
Computer Models in Biomechanics: From Nano to Macro

This book contains a collection of papers that were presented at the IUTAM Symposium

on “Computer Models in Biomechanics: From Nano to Macro” held at Stanford University, California, USA, from August 29 to September 2, 2011.

It contains state-of-the-art papers on:

- Protein and Cell...

Google for Dummies
Google for Dummies

Sure, you know it searches, but all the other things Google can do will leave you, well, google-eyed. So journey into the heart of Google and then to its outer limits with this friendly guide! Discover how you can use Google to get the news, go shopping, build your business, play games, find phone numbers, and even go blogging.

...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

An Inductive Logic Programming Approach to Statistical Relational Learning
An Inductive Logic Programming Approach to Statistical Relational Learning
In this publication, the author Kristian Kersting has made an assault on one of the hardest integration problems at the heart of Artificial Intelligence research. This involves taking three disparate major areas of research and attempting a fusion among them. The three areas are: Logic Programming, Uncertainty Reasoning and Machine Learning. Every...
Result Page: 61 60 59 58 57 56 55 54 53 52 51 50 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy