Home | Amazing | Today | Tags | Publishers | Years | Search 
Mechanical System Dynamics (Lecture Notes in Applied and Computational Mechanics)
Mechanical System Dynamics (Lecture Notes in Applied and Computational Mechanics)
Mechanics as a fundamental science in Physics and in Engineering deals with interactions of forces resulting in motion and deformation of material bodies. Similar to other sciences Mechanics serves in the world of Physics and in that of Engineering in a different way, in spite of many and increasing interdependencies. Machines...
Cloud Computing: Automating the Virtualized Data Center (Networking Technology)
Cloud Computing: Automating the Virtualized Data Center (Networking Technology)

Cloud computing is a paradigm shift in the IT industry similar to the displacement of local electric generators with the electric grid, providing utility computing, and it is changing the nature of competition within the computer industry. There are over a hundred companies that claim they can provide cloud services....

Enterprise Games: Using Game Mechanics to Build a Better Business
Enterprise Games: Using Game Mechanics to Build a Better Business
We are living in a time of big changes. We face changes driven by powerful forces like world population growth; rising prices for food, fuel, and raw materials; depletion of natural resources; and increasing levels of greenhouse gases in the atmosphere. And at the very same time, we are also surrounded by the...
Essential Scrum: A Practical Guide to the Most Popular Agile Process
Essential Scrum: A Practical Guide to the Most Popular Agile Process

A Practical Guide to the Most Popular Agile Process

 

The Single-Source, Comprehensive Guide to Scrum for All Team Members, Managers, and Executives

 

If you want to use...

Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Practical Vim: Edit Text at the Speed of Thought (Pragmatic Programmers)
Practical Vim: Edit Text at the Speed of Thought (Pragmatic Programmers)
Conventional wisdom dictates that Vim has a steep learning curve. I think most Vim users would disagree. Sure, there’s an initial hump, but once you run through vimtutor and learn the basics of what to put in your vimrc, you reach a point where you can actually get work done—a sort of hobbled...
Learning Android Game Programming: A Hands-On Guide to Building Your First Android Game
Learning Android Game Programming: A Hands-On Guide to Building Your First Android Game

In early 2010 the availability of powerful and free 2D game engines for the Android

platform was an almost empty field. Today, developers can pick from a few engines that best fit the purpose of unleashing their individual creativity.

With currently more than 500,000 Android devices being
...
The Fantastic Inventions of Nikola Tesla (Lost Science)
The Fantastic Inventions of Nikola Tesla (Lost Science)
While a large portion of the European family has been surging westward during the last three or four hundred years, settling the vast continents of America, another, but smaller, portion has been doing frontier work in the Old World, protecting the rear by beating back the "unspeakable Turk" and reclaiming gradually the...
100 Things You Should Know about Sales and Distribution in SAP ERP
100 Things You Should Know about Sales and Distribution in SAP ERP

It is Friday afternoon, you are ready to go home but you get a call from your customer telling you that their order will need to be express delivered. The only thing now between you and your weekend is changing the delivery priority in a hundred and sixty-eight order items.

The good news is there is now a resource for you to
...

History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
The first of these two volumes might be entitled the "German Conquest of Western Europe," and the second the "Age of Justinian." The first covers more than one hundred and twenty years, the second somewhat less than fifty. This disparity is a striking illustration of the fact that...
Learning from Data: Concepts, Theory, and Methods
Learning from Data: Concepts, Theory, and Methods
A learning method is an algorithm (usually implemented in software) that esti- mates an unknown mapping (dependency) between a system’s inputs and outputs from the available data, namely from known (input, output) samples. Once such a dependency has been accurately estimated, it can be used for prediction of future system...
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy