Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)
Anticipatory Optimization for Dynamic Decision Making (Operations Research/Computer Science Interfaces Series)

Anticipatory optimization for dynamic decision making relies on a number of different scientific disciplines. On a general level, the foundations of the field may be localized at the intersection of operations research, computer science and decision theory. Closer inspection reveals the important role of branches such as simulation,...

Political Transformations and Public Finances: Europe, 1650-1913 (Political Economy of Institutions and Decisions)
Political Transformations and Public Finances: Europe, 1650-1913 (Political Economy of Institutions and Decisions)

How did today's rich states first establish modern fiscal systems? To answer this question, Political Transformations and Public Finances by Mark Dincecco examines the evolution of political regimes and public finances in Europe over the long term. The book argues that the emergence of efficient fiscal institutions was the result of two...

Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science
Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science
This book describes the vast opportunity created by unifying science and integrating technology, and recommends transforming ideas for individuals and society. We stand at the threshold of a new renaissance in knowledge based on the structure and behavior of matter from the nanoscale up to the most complex system yet discovered, the human brain....
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Structural Investigation of Historic Buildings: A Case Study Guide to Preservation Technology for Buildings, Bridges, Towers and Mills
Structural Investigation of Historic Buildings: A Case Study Guide to Preservation Technology for Buildings, Bridges, Towers and Mills

A toolkit for giving our historic built environment a second life

Conservation of our existing structures has obvious economic and social value. Moreover, historic structures provide an excellent laboratory for studying aspects of structural engineering, materials science, forensic engineering, and building design. Structural...

Microsoft Exchange Server 2010 Inside Out
Microsoft Exchange Server 2010 Inside Out

Welcome to my tenth book covering the technology in Microsoft Exchange Server and its surrounding ecosystem. I seem to have been constantly writing about Exchange since before its introduction as version 4.0 in March 1996 in books and many articles printed in the redoubtable Windows IT Pro magazine (http://www.windowsitpro.com). All my...

Due Diligence and the Business Transaction: Getting a Deal Done
Due Diligence and the Business Transaction: Getting a Deal Done

Due Diligence and the Business Transaction: Getting a Deal Done  is a practical guide to due diligence for anyone buying or selling a privately held business or entering into a major agreement with another company. 

When you’re buying a business, it’s wise to conduct due
...

EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics, includes DVD: The Official EnCE: EnCase Certified Examiner Study Guide
Fully revised for the very latest EnCE exam and EnCase software

EnCE certification tells the world that you've not only mastered the use of EnCase Forensic Software, but also that you have acquired the in-depth forensics knowledge and techniques you need to conduct complex computer examinations. This official study guide,...

Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)
Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)

In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...

Nutrient-Gene Interactions in Cancer
Nutrient-Gene Interactions in Cancer

The complete mapping of the human genome, along with the development of sophisticated molecular technologies, has accelerated research on the relationship between nutrients and genes. This has led to compelling evidence garnered from epidemiological and experimental observations supporting the idea that the interaction between nutrients and...

Fractures of the Cervical, Thoracic, and Lumbar Spine (Mechanical Engineering Series)
Fractures of the Cervical, Thoracic, and Lumbar Spine (Mechanical Engineering Series)
Spinal trauma is a potentially devastating occurrence associated with significant morbidity and mortality. Fortunately, with improved ‘‘in-field’’ management protocols, ‘‘in-hospital’’ resuscitation measures, and further insight into the pathophysiology of spinal cord injury, progress is being made...
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy