Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Differential Equations: Stationary Partial Differential Equations, Volume 6
Handbook of Differential Equations: Stationary Partial Differential Equations, Volume 6

This is a survey on elliptic boundary value problems on varying domains and tools needed for that. Such problems arise in numerical analysis, in shape optimisation  problems and in the investigation of the solution structure of nonlinear elliptic equations. The methods are also useful to obtain certain results for equations on non-smooth...

Statistical Graphics in SAS: An Introduction to the Graph Template Language and the Statistical Graphics Procedures
Statistical Graphics in SAS: An Introduction to the Graph Template Language and the Statistical Graphics Procedures

Effective graphics are indispensable for modern statistical analysis. They reveal patterns, differences, and uncertainty that are not readily apparent in tabular output. Graphics provoke questions that stimulate deeper investigation, and they add visual clarity and rich content to reports and presentations.

The Graph Template...

Pain: Psychological Perspectives
Pain: Psychological Perspectives
This volume offers a state-of-the-art, comprehensive account of the psychology
of pain that encompasses clinical perspectives but also basic social and
behavioral science as well as biopsychological contributions to the field.
The relatively recent focus on pain as a subjective experience has led to
dramatic improvements in our
...
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
EnCase Computer Forensics: The Official EnCE: EnCase Certified Examiner Study Guide
Whether monitoring the Internet for threats and chatter, capturing computer evidence, or crunching forensic data, Guidance Software's EnCase computer forensics software is recognized as the premier computer forensics tool on the market. For investigation professionals, EnCE certification tells the world that you've not only mastered the use of...
Japanese Outbound Acquisitions: Explaining What Works
Japanese Outbound Acquisitions: Explaining What Works

This book reviews the past 116 Japanese outbound acquisitions in three decades and determines success and failure, with the goal of explaining what works. Dr. Matsumoto emphasizes that such acquisitions are part of a long-term strategy and should not be judged based short-term gains and losses, especially short-term changes in...

Learning Together Online: Research on Asynchronous Learning Networks
Learning Together Online: Research on Asynchronous Learning Networks
This book is about the past and future of research on the effectiveness of learning networks, a type of e-learning, online learning, Web-based learning, computer-supported collaborative learning, or virtual classroom (to use a number of common terms) in which students and teachers learn together online. The formal term is ...
Investigating Computer Crime
Investigating Computer Crime
Investigating Computer Crime will prove a welcome addition to any security department's library.
-Security Management

Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the
...
Models of Discovery and Creativity (Origins: Studies in the Sources of Scientific Creativity)
Models of Discovery and Creativity (Origins: Studies in the Sources of Scientific Creativity)

Since the origin of the modern sciences, our views on discovery and creativity had a remarkable history. Originally, discovery was seen as an integral part of methodology and the logic of discovery as algorithmic or nearly algorithmic. During the nineteenth century, conceptions in line with romanticism led to the famous opposition between the...

Relational Database Theory: A Comprehensive Introduction
Relational Database Theory: A Comprehensive Introduction

This book presents a systematic treatment of the formal theory of the relational model of data, which is the foundation of current database management systems. It can be used as a text for a graduate course in database theory, or as an additional reference for an undergraduate course on data management. It will also be useful to researchers...

R for Business Analytics
R for Business Analytics

R for Business Analytics looks at some of the most common tasks performed by business analysts and helps the user navigate the wealth of information in R and its 4000 packages.  With this information the reader can select the packages that can help process the analytical tasks with minimum effort and maximum usefulness. The use of...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy