Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites (CMCs) represent a relatively new class of quasiductile ceramic materials. They are characterized by carbon or ceramic fi bers embedded in ceramic matrices (oxide or non - oxide) with comparatively low bonding forces between the fi bers and the matrix. These weak intefaces, in combination with a porous...
The McKinsey Engagement: A Powerful Toolkit For More Efficient and Effective Team Problem Solving
The McKinsey Engagement: A Powerful Toolkit For More Efficient and Effective Team Problem Solving

The third volume in the internationally bestselling McKinsey Trilogy, The McKinsey Engagement is an action guide to realizing the consistently high level of business solutions achieved by the experts at the world’s most respected consulting firms.

Former consultant Dr. Paul Friga distills the guiding principles first...

Case Studies In Knowledge Management
Case Studies In Knowledge Management
Knowledge Management (KM) has been growing in importance and popularity
as a research topic since the mid 1990s. This is sufficient time for many organizations
to implement KM initiatives and KM systems (KMS). This book presents twenty cases
investigating the implementation of KM in a number of business and industry settings
and
...
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:...
How to Become a Better Negotiator (Work Smart)
How to Become a Better Negotiator (Work Smart)

Whether it’s at home or at work, so much of our lives involves negotiating to get what we want. From negotiating a higher salary, to lowering costs from suppliers, to hammering out a new contract with a major customer, or even deciding where to go on vacation, the only way to consistently arrive at successful conclusions is to master the...

Game Coding Complete, Third Edition
Game Coding Complete, Third Edition

I had been playing the Ultima series of games by Richard Garriott since I was in high school, and I was a die-hard fan. Every game he published, I played all the way through, from Ultima I on the Apple ][ to Ultima V on the IBM PC. Ultima VI came out right as I graduated from college, and I noticed that the contact information for Origin...

CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)

CD FEATURES More Than 200 PRACTICE QUESTIONS

 

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for...

The Stone Frigate: The Royal Military College's First Female Cadet Speaks Out
The Stone Frigate: The Royal Military College's First Female Cadet Speaks Out
Winner of the 2020 Ontario Historical Society Alison Prentice Award • Finalist for the 2020 Kobo Emerging Writer Prize in Nonfiction

A memoir from the first female cadet admitted to the Royal Military College of Canada.

Kate Armstrong was an ordinary young woman eager to leave an abusive
...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Dictionary of Military Terms: Over 6,000 Words Clearly Defined
Dictionary of Military Terms: Over 6,000 Words Clearly Defined
Over 6,000 entries provide up-to-date coverage of British, American, and international military vocabulary.
 
English is the language most frequently used in international military and peacekeeping operations. This dictionary aims to provide a basic vocabulary of British and American terms relating to the...
Teaching and Measuring Cognitive Readiness
Teaching and Measuring Cognitive Readiness

Teaching and Measuring Cognitive Readiness presents theoretical and empirical findings regarding cognitive readiness and assessments of their impact on adult learning. The term readiness is used in assessing student preparation for K-12 schools, while in the military and in industry, "readiness" denotes preparation to...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy