Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hesitant Fuzzy Sets Theory (Studies in Fuzziness and Soft Computing)
Hesitant Fuzzy Sets Theory (Studies in Fuzziness and Soft Computing)

This book provides the readers with a thorough and systematic introduction to hesitant fuzzy theory. It presents the most recent research results and advanced methods in the field. These includes: hesitant fuzzy aggregation techniques, hesitant fuzzy preference relations, hesitant fuzzy measures, hesitant fuzzy clustering algorithms and...

Fractures of the Cervical, Thoracic, and Lumbar Spine (Mechanical Engineering Series)
Fractures of the Cervical, Thoracic, and Lumbar Spine (Mechanical Engineering Series)
Spinal trauma is a potentially devastating occurrence associated with significant morbidity and mortality. Fortunately, with improved ‘‘in-field’’ management protocols, ‘‘in-hospital’’ resuscitation measures, and further insight into the pathophysiology of spinal cord injury, progress is being made...
Technology and Safety of Marine Systems (Ocean Engineering Series)
Technology and Safety of Marine Systems (Ocean Engineering Series)
Traditionally society has regulated hazardous industries by detailed references to engineering codes, standards and hardware requirements. These days a risk-based approach is adopted. Risk analysis involves identifying hazards, categorizing the risks, and providing the necessary decision support to determine the necessary arrangements and...
Macromedia Flash MX Video
Macromedia Flash MX Video

Let's make movies! Interactive movies, totally integrated into your Flash interface! With Macromedia Flash MX you have the power to import digital video and sound, and manipulate them just like any other media object. That's a whole world of design possibilities.

This book hopes to take you through all you'll need to...

Multidimensional Databases and Data Warehousing (Synthesis Lectures on Data Management)
Multidimensional Databases and Data Warehousing (Synthesis Lectures on Data Management)

The present book's subject is multidimensional data models and data modeling concepts as they are applied in real data warehouses. The book aims to present the most important concepts within this subject in a precise and understandable manner. The book's coverage of fundamental concepts includes data cubes and their elements, such as...

Statistics for Linguistics with R: A Practical Introduction (Mouton Textbook)
Statistics for Linguistics with R: A Practical Introduction (Mouton Textbook)

This book is the revised and extended second edition of Statistics for Linguistics with R. The comprehensive revision includes new small sections on programming topics that facilitate statistical analysis, the addition of a variety of statistical functions readers can apply to their own data, and a revision of overview sections on statistical...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2013 Workshops: DMApps, DANTH, QIMIE, BDM, CDA, CloudSD, Golden Coast, QLD, ... Papers (Lecture Notes in Computer Science)
Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2013 Workshops: DMApps, DANTH, QIMIE, BDM, CDA, CloudSD, Golden Coast, QLD, ... Papers (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings at PAKDD Workshops 2013, affiliated with the 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) held in Gold Coast, Australia in April 2013.
The 47 revised full papers presented were carefully reviewed and selected from 92 submissions. The workshops affiliated
...

PowerPivot for Business Intelligence Using Excel and SharePoint
PowerPivot for Business Intelligence Using Excel and SharePoint

PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Hardening Windows (Expert's Voice)
Hardening Windows (Expert's Voice)

System administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to gain access to the SQL server, but they can bet that there will be an attempt soon. Because the operating system is vital to a computer's functioning, and because it's the only layer between the machine's available resources and...

Wireless Data for the Enterprise
Wireless Data for the Enterprise

Everything you should know about "going wireless"

A valuable reality check for the many claims about wireless, Wireless Data For The Enterprise sorts out myth from fact, truth from exaggeration. This guide by George Faigen, Boris Fridman, and Arielle Emmett shows you how your enterprise can extend its...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy