Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theories of Information, Communication and Knowledge: A Multidisciplinary Approach
Theories of Information, Communication and Knowledge: A Multidisciplinary Approach

This book addresses some of the key questions that scientists have been asking themselves for centuries: what is knowledge? What is information? How do we know that we know something? How do we construct meaning from the perceptions of things? Although no consensus exists on a common definition of the concepts of information and...

Peopleware: Productive Projects and Teams (3rd Edition)
Peopleware: Productive Projects and Teams (3rd Edition)

Peopleware has long been one of my two favorite books on software engineering. Its underlying strength is its base of immense real experience, much of it quantified. Many, many varied projects have been reflected on and distilled; but what we are given is not just lifeless distillate, but vivid examples from...

Emerging Pathologies in Cardiology: Proceedings of the Mediterranean Cardiology Meeting 2005
Emerging Pathologies in Cardiology: Proceedings of the Mediterranean Cardiology Meeting 2005

Clinical practice is evolving at a rapid pace,nowhere more so than in the field of cardiology.Acute Coronary Syndromes, Sudden Cardiac Death, Heart Failure, Atrial Fibrillation,Syncope,and Prevention of Global Cardiovascular Risk are the main Emerging Pathologies to which many investigators are addressing their researches. Less than 10 years...

Macromedia Flash MX 2004 Killer Tips
Macromedia Flash MX 2004 Killer Tips

The hottest collection of cool tips and hidden secrets for the Flash MX 2004 user who needs results fast! In today's economy, time is money. Flash MX 2004 Killer Tips is all about speed, showing users how to get more work done in less time. This book is designed to increase productivity (and...

Introduction to Computer Security
Introduction to Computer Security

In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security...

How to Buy a House with No (or Little) Money Down, 3rd Edition
How to Buy a House with No (or Little) Money Down, 3rd Edition
The Ultimate guide to finding and financing a home

Almost everyone aspires to owning a home, but the reality of coming up with a large enough down payment often stands in the way of making that dream come true. No longer! How to Buy a House with No (or Little) Money Down has helped tens of thousands become homeowners, and now it's your turn!...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
Don't Just Do Something, Stand There!: Ten Principles for Leading Meetings That Matter
Don't Just Do Something, Stand There!: Ten Principles for Leading Meetings That Matter
Most people think meetings are all too often a waste of time. But Weisbrod and Janoff say that's only because of the way most meetings are run. In this book they offer ten principles that will allow you to get more done in meetings by doing less. The key is knowing what you can and can't control. You can't controol people's...
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
The focused ion beam (FIB) instrument has experienced an intensive period of maturation since its inception. Numerous new techniques and applications have been brought to fruition by the tireless efforts of some very innovative scientists with the foresight to recognize the potential of this upstart apparatus. Over the past few years, the FIB has...
Result Page: 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy