Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Addiction Among Cyberkids in China: Risk Factors and Intervention Strategies
Internet Addiction Among Cyberkids in China: Risk Factors and Intervention Strategies
Focusing on the two essential factors of the construction of risk, this book presents research revolving around the staging of and the coping with Internet addiction in China. Using ethnographic methods, it investigates the signs and treatment of Internet addiction and discusses the in-patient approaches used to help children overcome...
Stock Options and the New Rules of Corporate Accountability : Measuring, Managing, and Rewarding Executive Performance
Stock Options and the New Rules of Corporate Accountability : Measuring, Managing, and Rewarding Executive Performance
Chairman, President, and CEO, Ceridian Corporation

Executive compensation in America is out of control. Board members of some of America's largest corporations have publicly acknowledged this problem and are actively searching for solutions. While new accounting rules requiring an expense for options are a step in the right...

Distances and Similarities in Intuitionistic Fuzzy Sets (Studies in Fuzziness and Soft Computing)
Distances and Similarities in Intuitionistic Fuzzy Sets (Studies in Fuzziness and Soft Computing)

This book presents the state-of-the-art in theory and practice regarding similarity and distance measures for intuitionistic fuzzy sets. Quantifying similarity and distances is crucial for many applications, e.g. data mining, machine learning, decision making, and control. The work provides readers with a comprehensive set of theoretical...

Epidemiology of Pediatric Sports Injuries: Individual Sports (Medicine and Sport Science, Vol. 48)
Epidemiology of Pediatric Sports Injuries: Individual Sports (Medicine and Sport Science, Vol. 48)

Epidemiology of Pediatric Sport Injuries reviews integratively the existing data on distribution and determinants of injury rates in a variety of sports, and suggests injury prevention measures and guidelines for further research. This volume focuses on individual sports, as the next volume will discuss team sports. Together the two volumes...

SQL Server 2000 for Experienced DBAs
SQL Server 2000 for Experienced DBAs

Configure and manage SQL Server 2000 for peak performance and high availability using the undocumented administrative and troubleshooting techniques offered inside this focused reference. SQL Server expert Brian Knight gives you details on system and platform architecture, settings, security, file management, replication, automation,...

Attitudes and Opinions
Attitudes and Opinions
Notable advances resulting from new research findings, measurement approaches, widespread uses of the Internet, and increasingly sophisticated approaches to sampling and polling, have stimulated a new generation of attitude scholars. This extensively revised edition captures this excitement, while remaining grounded in scholarly research....
Joomla! Web Security
Joomla! Web Security
In Detail

Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...

49: Epidemiology of Pediatric Sports Injuries: Team Sports (Medicine and Sport Science, Vol. 49)
49: Epidemiology of Pediatric Sports Injuries: Team Sports (Medicine and Sport Science, Vol. 49)

Is the risk of injury greater in some sport activities than in others? What types of injuries are most common? Are some children prone to sports injury? Are some physical, psychological, or sport-related factors associated with an increased risk of injury? Can injury be prevented and if so, how? Epidemiology of Pediatric Sport Injuries...

Cyber Warfare and Cyber Terrorism (Premier Reference)
Cyber Warfare and Cyber Terrorism (Premier Reference)
The number of publicized terrorist attacks started to escalate beginning in the mid-1990s. From the attacks that received wide coverage by the world press, we have arrived to the point where not a single day passes without a terrorist committing such acts. It is the spectacular that is getting first-page coverage by the mass media. The basic...
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Advances in K-means Clustering: A Data Mining Thinking (Springer Theses: Recognizing Outstanding Ph.D. Research)
Advances in K-means Clustering: A Data Mining Thinking (Springer Theses: Recognizing Outstanding Ph.D. Research)
The series ‘‘Springer Theses’’ brings together a selection of the very best Ph.D. theses from around the world and across the physical sciences. Nominated and endorsed by two recognized specialists, each published volume has been selected for its scientific excellence and the high impact of its contents for...
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth

Get your financial life in order. This comprehensive and objective guidebook will help you grow your net worth on a steady and increasing basis, regardless of your income level.

This new and expanded edition covers changes and strategies to maximize financial benefits and planning resulting from the recent tax legislation,
...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy