Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Guerrilla Marketing for Consultants: Breakthrough Tactics for Winning Profitable Clients
Proven guerrilla marketing tactics specifically designed for consultants

Jay Conrad Levinson’s Guerrilla Marketing revolutionized the way marketers do business by defying the conventional wisdom that effective marketing means spending big bucks. He devised highly successful marketing strategies that rely on creativity, imagination, and...

Ultra-Wideband Communications Systems: Multiband OFDM Approach (Wiley Series in Telecommunications & Signal Processing)
Ultra-Wideband Communications Systems: Multiband OFDM Approach (Wiley Series in Telecommunications & Signal Processing)
The only book that provides full coverage of UWB multiband OFDM technology

Ultra-wideband (UWB) has emerged as a technology that offers great promise to satisfy the growing demand for low-cost, high-speed digital networks. The enormous bandwidth available, the potential for high data rates, and the promise for small size and low processing...

Methodological Advancements in Intelligent Information Technologies: Evolutionary Trends
Methodological Advancements in Intelligent Information Technologies: Evolutionary Trends
Methodological Advancements in Intelligent Information Technologies: Evolutionary Trends brings together research from international authors detailing developments in intelligent information technologies and their impact on organizational environments. This esteemed reference publication covers topics on agent-based approaches to...
Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches
Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches

Since the first part of the twentieth century, cybernetics and systems research have been developed as scientific disciplines. Investigations, launched in the area of cybernetics, previously dealt with control and information processing. In a more narrow sense, they consisted in the consideration of analogies of the control and the...

A Guide to the Business Analysis Body of Knowledge(r) (Babok(r) Guide)
A Guide to the Business Analysis Body of Knowledge(r) (Babok(r) Guide)

Business analysis is the set of tasks and techniques used to work as a liaison among stakeholders in order to understand the structure, policies, and operations of an organization, and to recommend solutions that enable the organization to achieve its goals. Business analysis involves understanding how organizations function to accomplish...

Nanoparticles and Occupational Health (Journal of Nanoparticle Research, 9)
Nanoparticles and Occupational Health (Journal of Nanoparticle Research, 9)

This volume, a reprint from a special issue of the Journal of Nanoparticle Research, draws on work presented at The Second International Symposium on Nanotechnology and Occupational Health, held in Minnesota in 2005. It presents an interdisciplinary approach to nanotechnology and occupational health and offers an overview of recent...

New Trends in Databases and Information Systems (Advances in Intelligent Systems and Computing)
New Trends in Databases and Information Systems (Advances in Intelligent Systems and Computing)
Database and information systems technologies have been rapidly evolving in several directions over the past years. New types and kinds of data, new types of applications and information systems to support them raise diverse challenges to be addressed. The so-called big data challenge, streaming data management and processing, social networks...
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)

Medical imaging has been transformed over the past 30 years by the advent of computerized tomography (CT), magnetic resonance imaging (MRI), and various advances in x-ray and ultrasonic techniques. An enabling force behind this progress has been the (so far) exponentially increasing power of computers, which has made it practical to explore...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Enterprise Information Systems VI
Enterprise Information Systems VI
This book contains the best papers of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004), held in Porto (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control) in collaboration with PORTUCALENSE UNIVERSITY, who hosted the event.

Following the
...
Distributed and Parallel Systems: From Cluster to Grid Computing
Distributed and Parallel Systems: From Cluster to Grid Computing
The sixthAustrian-HungarianWorkshop onDistributed and Parallel Systems is organized jointly byUniversity of Innsbruck and theMTASZTAKIComputer and Automation Research Institute. The series of workshops started as a small regional meeting early in the nineties, and since then it evolved a lot and became an acknowledged international scientific...
Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part I
Computational Science - ICCS 2004: 4th International Conference, KrakГіw, Poland, June 6-9, 2004, Proceedings, Part I
The four-volume set LNCS 3036, LNCS 3037, LNCS 3038 and LNCS 3039 constitutes the refereed proceedings of the 4th International Conference on Computational Science, ICCS 2004, held in Kraków, Poland in June 2004.

The four volumes present more than 550 reviewed contributed and invited papers of the main conference and its 30 workshops....

unlimited object storage image
Result Page: 225 224 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy