Home | Amazing | Today | Tags | Publishers | Years | Search 
Control Techniques for Complex Networks
Control Techniques for Complex Networks
A representative of a major publishing house is on her way home from a conference in Singapore, excited about the possibility of a new book series. On the flight home to New York she opens her blackberry organizer, adding names of new contacts, and is disappointed to realize she may have caught the bug that was bothering her friend Alex at the...
Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions)
Tools enabling managers to carry out financial calculations have evolved in the last 20 years from tables through calculators to programs on PCs and personal organisers. Today, the majority of those in finance have Excel on their desks and increasingly on their laptops or pocket computers.

Mastering Financial Mathematics in Microsoft...

Gameplay and design
Gameplay and design
Before we delve into the murky depths of game design, I feel a brief historical overview of the games industry is necessary for the readers who are not familiar with the rapid growth and current state of our fast-paced industry.

The games industry is relatively young compared to most other industries, but it is one of the fastest growing
...
Genome Sequencing Technology and Algorithms
Genome Sequencing Technology and Algorithms
The 2003 completion of the Human Genome Project was just one step in the evolution of DNA sequencing. Now from a "who's who" of pioneers in the field comes the latest genome sequencing and assembly advances that are redefining the field. This trail-blazing work gives researchers unparalleled access to state-of-the-art DNA...
Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Packet Switching And X.25 Networks
Packet Switching And X.25 Networks
When computers started to become business tools and to assume an essential role in all companies, they were very large both physically and in terms of capital and revenue cost. Indeed, when erecting a new building the company would have to design features especially for the computer. A big room to house it, separate power supplies, large...
Microprocessor Theory and Applications with 68000/68020 and Pentium
Microprocessor Theory and Applications with 68000/68020 and Pentium
A self-contained introduction to microprocessor theory and applications

This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Intel® Pentium®. It begins with an overview of microprocessors—including...

Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
Biological Database Modeling
Biological Database Modeling
Modern biological research in areas like drug discovery produces a staggering volume of data, and the right modeling tools can help scientists apply it in ways never before imaginable. This collection of next-generation biodata modeling techniques combines innovative concepts, methods, and applications with case studies in genome, microarray,...
Protocol Management in Computer Networking
Protocol Management in Computer Networking
Presents a novel management framework, referred to as the Measurement-Estimation-SchedulingActuation (or MESA) model. This is not a book about network management...but rather a book about management in networking. DLC: Computer network protocols.

This book presents a novel management framework, which I refer to as the
...
Beagles For Dummies (Pets)
Beagles For Dummies (Pets)
Beagles are an extraordinary breed—no bones about it. They’re cute, compact, fun-loving, and great with kids. (Not to mention those soulful eyes!) But their sense of humor, independence, and stubborn nature isn’t for everyone. So whether you’re thinking about getting your very own Snoopy-dog, or if you’ve already...
Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy