Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

Wastewater Pathogens (Wastewater Microbiology)
Wastewater Pathogens (Wastewater Microbiology)
A practical guide to wastewater pathogens

Wastewater treatment professionals face daily exposure to a wide variety of pathogens. These include viruses, bacteria, fungi, protozoa, and helminthes, as well as allergins, endotoxins, and exotoxins. While generally minimal, potential health hazards are still cause for concern....

Planning and Designing Effective Metrics
Planning and Designing Effective Metrics

Metrics are a hot topic. Executive leadership, boards of directors, management, and customers are all asking for data-based decisions. As a result, many managers, professionals, and change agents are asked to develop metrics, but have no clear idea of how to produce meaningful ones. Wouldn’t it be great to have a fast, simple...

Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
Modelling and Reasoning with Vague Concepts
Modelling and Reasoning with Vague Concepts
Vagueness is central to the flexibility and robustness of natural language descriptions. Vague concepts are robust to the imprecision of our perceptions, while still allowing us to convey useful, and sometimes vital, information. The study of vagueness in Artificial Intelligence (AI) is therefore motivated by the desire to incorporate this...
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
Improving Profit: Using Contribution Metrics to Boost the Bottom Line
Improving Profit: Using Contribution Metrics to Boost the Bottom Line

Business of all sizes have a problem: How do you know—in real time—whether you are earning the profit you need to grow or even just stay in business? And which products or services are doing the “heavy lifting” in contributing to profit? Financial statements tell only part of the story. They are backward looking, for...

Rabies
Rabies

Rabies offers a complete account of one of the oldest known diseases threatening public health today. Unlike most research-oriented descriptions of rabies, this book provides a narrative about the disease and its etiologic agent, encompassing the historical background to recent developments. The emphasis on the basic biology and...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy