Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

S+Functional Data Analysis User's Guide
S+Functional Data Analysis User's Guide
S+Functional Data Analysis is the first commercial object oriented package for exploring, modeling, and analyzing functional data. Functional data analysis (FDA) handles longitudinal data and treats each observation as a function of time (or other variable). The functions are related. The goal is to analyze a sample of functions instead of a...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Exploring Abstract Algebra With Mathematica®
Exploring Abstract Algebra With Mathematica®
This upper-division laboratory supplement for courses in abstract algebra consists of several Mathematica packages programmed as a foundation for group and ring theory. Additionally, the "user's guide" illustrates the functionality of the underlying code, while the lab portion of the book reflects the contents of the...
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World
Effective Digital Learning: Transforming Traditional Learning Models to a Virtual World

Traditional learning as we know it has evolved. Gone are the days when students need to travel to a physical location to learn. With the increase of mobile devices and broadband Internet services, learning can take place anywhere at any time. Effective Digital Learning is here to help you make the paradigm shift with...

Developing Extensions for Macromedia® Flash® 8
Developing Extensions for Macromedia® Flash® 8

Developing Extensions for Macromedia Flash 8

describes how to build Flash JavaScript extensions to enhance the developer's experience while working in the Flash authoring environment. This book explains how each type of extension works and describes the JavaScript...

The Transparency Edge: How Credibility Can Make or Break You in Business
The Transparency Edge: How Credibility Can Make or Break You in Business

In The Transparency Edge, leadership expert Barbara Pagano demonstrates that a clear and open business policy is a powerful management tool. Backed by exclusive research of thousands of executives at Fortune 500 companies, this comprehensive guide to what-you-see-is-what-you-get leadership shows you how to practice a transparent...

Sams Teach Yourself Word 2003 in 24 Hours
Sams Teach Yourself Word 2003 in 24 Hours
For readers who are new to Word 2003 and want to get up and running quickly, Sams Teach Yourself Microsoft Word 2003 in 24 Hours will do the trick. This book includes shortcuts and ways to accomplish the most common tasks in Word. Readers are able to work at their own pace through the easily digestible, one-hour...
Developing Java Beans (Java Series)
Developing Java Beans (Java Series)
Java Beans is the most important new development in Java this year. Beans is the next generation of Java technology that not only adds features the language lacked, but also lets Java programs interoperate with a number of development environments. The initial release includes a bridge for Microsoft's ActiveX/COM; future releases will include...
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

Observing the User Experience: A Practitioner's Guide to User Research
Observing the User Experience: A Practitioner's Guide to User Research

The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created.

...
unlimited object storage image
Result Page: 963 962 961 960 959 958 957 956 955 954 953 952 951 950 949 948 947 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy