Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
This book provides a platform for discussing the challenges that organizations face in order to implement sustainability, ethics, and effective corporate governance, all of which are important elements of “standing out” from other companies. Examining the background of the New European Consensus on development with the new...
American Government: Constitutional Democracy Under Pressure
American Government: Constitutional Democracy Under Pressure

American Government: Constitutional Democracy Under Pressure highlights the necessary tension between our constitutional principles and institutions and the populist heat that sometimes roils our national politics, especially at the current political moment. Our constitutional democracy has been under pressure for some time,...

Advanced Topics in Fuzzy Graph Theory (Studies in Fuzziness and Soft Computing (375))
Advanced Topics in Fuzzy Graph Theory (Studies in Fuzziness and Soft Computing (375))

This book builds on two recently published books by the same authors on fuzzy graph theory. Continuing in their tradition, it provides readers with an extensive set of tools for applying fuzzy mathematics and graph theory to social problems such as human trafficking and illegal immigration. Further, it especially focuses on advanced...

Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
A comprehensive overview of managing and assessing safety and functionality of ageing offshore structures and pipelines
A significant proportion, estimated at over 50%, of the worldwide infrastructure of offshore structures is in a life extension phase and is vulnerable to ageing processes. This book captures the central
...
C++ Common Knowledge: Essential Intermediate Programming
C++ Common Knowledge: Essential Intermediate Programming

What Every Professional C++ Programmer Needs to Know—Pared to Its Essentials So It Can Be Efficiently and Accurately Absorbed

C++ is a large, complex language, and learning it is never entirely easy. But some concepts and techniques must be thoroughly mastered if...

Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
PC Hacks : 100 Industrial-Strength Tips &Tools
PC Hacks : 100 Industrial-Strength Tips &Tools
Covering both Windows and Linux, PC Hacks combines the bestselling Hacks series style with the world's most popular computing hardware. Hacks for enhancing performance and preventing problems with your PC include overclocking CPU and video cards, tweaking RAM timing, selecting the best performing components,...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
Total Area Networking: Atm, Ip, Frame Relay and Smds Explained
Total Area Networking ATM,IP, Frame Relay and SMDS Explained Second Edition John Atkins and Mark Norris BT, UK Total Area Networking explains how high-speed communications allow local facilities to become part of a more global network. This concept is the essential basis for super-connectivity, when the user sees a distributed set of network-based...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

JUnit in Action
JUnit in Action
A guide to unit testing Java applications (including J2EE applications) using the JUnit framework and its extensions, this book provides techniques for solving real-world problems such as unit testing legacy applications, writing real tests for real objects, automating tests, testing in isolation, and unit testing J2EE and database...
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists and engineers how to develop tailored, flexible, and efficient working environments built from small programs (scripts) written in the easy-to-learn, very high-level language Python. The focus is on examples and applications of relevance to computational science: gluing existing...
unlimited object storage image
Result Page: 867 866 865 864 863 862 861 860 859 858 857 856 855 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy