Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one...
Chart Your Way To Profits: The Online Trader's Guide to Technical Analysis (Wiley Trading)
Chart Your Way To Profits: The Online Trader's Guide to Technical Analysis (Wiley Trading)
One of my favorite photographs was taken by my wife on our honeymoon. We were on the second leg of our trip, the first of which was in Dubrovnik, Croatia (part of the former Yugoslavia), and the second in central Italy. The photo shows me in bed, apparently asleep. The title of the book I am holding across my chest is clearly legible: Technical...
Buffett Beyond Value: Why Warren Buffett Looks to Growth and Management When Investing
Buffett Beyond Value: Why Warren Buffett Looks to Growth and Management When Investing

A detailed look at how Warren Buffett really invests

In this engaging new book, author Prem Jain extracts Warren Buffett's wisdom from his writings, Berkshire Hathaway financial statements, and his letters to shareholders and partners in his partnership firms-thousands of pages written over the last fifty years. Jain uncovers...

Semantic Computing
Semantic Computing

Presents the state of the technology and points to future directions for semantic computing

Semantic computing, a rapidly evolving interdisciplinary field, seeks to structure, design, and manipulate computer content to better satisfy the needs and intentions of users and create a more meaningful user experience. This...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Engineering Design via Surrogate Modelling: A Practical Guide
Engineering Design via Surrogate Modelling: A Practical Guide
Think of a well-known public personality whom you could easily identify from a photograph. Consider now whether you would still recognize them if most of the photograph was obscured, except for the corner of an eye, a small part of their chin and, perhaps, a half of their mouth. This is a game often played on television quiz shows...
Think Like Zuck: The Five Business Secrets of Facebook's Improbably Brilliant CEO Mark Zuckerberg
Think Like Zuck: The Five Business Secrets of Facebook's Improbably Brilliant CEO Mark Zuckerberg

Wall Street Journal Bestseller

Make Your Mark in the World with the Five Success Principles of the World-Changing Social Media Site

If Facebook were a country, it would be the third largest in the world.
Facebook accounts for one of every seven minutes spent online.
...

An Illustrated Guide to Skin Lymphoma
An Illustrated Guide to Skin Lymphoma

Skin lymphomas are relatively rare. They may arise in the skin itself and as a by-product of HIV infection, or may arise elsewhere as a result of Hodgkin's disease, B cell lymphomas or leukaemia. Whatever the cause, they can easily be overlooked as psoriasis or dermatitis. Diagnosis of skin lymphoma is difficult and making the wrong...

Introduction to Logistics Systems Management
Introduction to Logistics Systems Management

Introduction to Logistics Systems Management is the fully revised and enhanced version of the 2004 prize-winning textbook Introduction to Logistics Systems Planning and Control, used in universities around the world.

This textbook offers an introduction to the methodological aspects of logistics systems management and...

Antenna Design for Mobile Devices (Wiley - IEEE)
Antenna Design for Mobile Devices (Wiley - IEEE)

Expanded and updated, this practical guide is a one-stop design reference containing all an engineer needs when designing antennas

  • Integrates state-of-the-art technologies with a special section for step-by-step antenna design
  • Features up-to-date bio-safety and electromagnetic compatibility regulation...
Globalization: A Basic Text
Globalization: A Basic Text

Updated to reflect recent global developments, the second edition of Globalization: A Basic Text presents an up-to-date introduction to major trends and topics relating to globalization studies.

  • Features updates and revisions in its accessible introduction to key theories and major topics in...
unlimited object storage image
Result Page: 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy