Home | Amazing | Today | Tags | Publishers | Years | Search 
HTML5 and JavaScript Web Apps
HTML5 and JavaScript Web Apps
HTML5 and JavaScript Web Apps is about building web applications with HTML5 and W3C specifications that are widely supported across all devices and browsers. It is intended for programmers who are facing the challenges of moving more code to the frontend with JavaScript, CSS, and HTML, while at the same time...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

Intelligent Complex Adaptive Systems
Intelligent Complex Adaptive Systems
I don’t believe in the existence of a complex systems theory as such and, so far, I’m still referring to complex systems science (CSS) in order to describe my research endeavours. In my view, the latter is constituted, up until now, by a bundle of loosely connected methods and theories aiming to observe— from...
Experiences of Test Automation: Case Studies of Software Test Automation
Experiences of Test Automation: Case Studies of Software Test Automation

Software test automation has moved beyond a luxury to become a necessity. Applications and systems have grown ever larger and more complex, and manual testing simply cannot keep up. As technology changes, and more organizations move into agile development, testing must adapt—and...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Innumeracy: Mathematical Illiteracy and Its Consequences (Vintage)
Innumeracy: Mathematical Illiteracy and Its Consequences (Vintage)

Dozens of examples in innumeracy show us how it affects not only personal economics and travel plans, but explains mischosen mates, inappropriate drug-testing, and the allure of psuedo-science.

Innumeracy, an inability to deal comfortably with the fundamental notions of number and chance, plagues far too many otherwise
...
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Games and Information: An Introduction to Game Theory
Games and Information: An Introduction to Game Theory
This book is about noncooperative game theory and asymmetric information. In the Introduction, I will say why I think these subjects are important, but here in the Preface I will try to help you decide whether this is the appropriate book to read if they do interest you.

I write as an applied theoretical
...
Leadership Without Excuses: How to Create Accountability and High-Performance (Instead of Just Talking About It)
Leadership Without Excuses: How to Create Accountability and High-Performance (Instead of Just Talking About It)

IT’S TIME FOR YOU TO INCREASE EMPLOYEE ACCOUNTABILITY—NO EXCUSES!

“Very engaging! Grimshaw and Baron provide practical coaching points on how to translate leadership intentions into results.”
DAVE HILFMAN, SENIOR VICE PRESIDENT, CONTINENTAL AIRLINES

“A timely collection...

The Project Management Advisor: 18 Major Project Screw-Ups, and How to Cut Them off at the Pass
The Project Management Advisor: 18 Major Project Screw-Ups, and How to Cut Them off at the Pass

This is the eBook version of the printed book.

This is your complete, hands-on guide to saving projects in trouble.

Drawing on 20 years of frontline project management experience, Lonnie Pacelli identifies the 18 most pervasive causes of project failure: their causes, early warning signs, and how to fix them...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Adobe Photoshop Elements 10: Maximum Performance: Unleash the hidden performance of Elements
Adobe Photoshop Elements 10: Maximum Performance: Unleash the hidden performance of Elements

Master the most powerful photo editing tools and techniques that Elements has to offer! Using step-by-step projects, Mark Galer will have you creating stunning images in no time at all. Whether you want to create impressive, seamless montages, optimize your photos for perfect print quality, or simply enhance your images for maximum impact,...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy