Home | Amazing | Today | Tags | Publishers | Years | Search 
Dipeptidyl Aminopeptidases: Basic Science and Clinical Applications (Advances in Experimental Medicine and Biology)
Dipeptidyl Aminopeptidases: Basic Science and Clinical Applications (Advances in Experimental Medicine and Biology)
DPP IV has been attributed a large array of functions, some of which are mediated by its exopeptidase activity. Although it only removes two amino acid residues at the N-terminus of the peptide, this cleavage can inactivate or modify the activity of regulatory peptides, peptide hormones, chemokines and neuropeptides. Several...
Fuzzy Cognitive Maps for Applied Sciences and Engineering: From Fundamentals to Extensions and Learning Algorithms
Fuzzy Cognitive Maps for Applied Sciences and Engineering: From Fundamentals to Extensions and Learning Algorithms

Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to “concepts” bearing different states of activation depending on the knowledge they represent, and the “edges” denoting the causal effects...

Transformation Electromagnetics and Metamaterials: Fundamental Principles and Applications
Transformation Electromagnetics and Metamaterials: Fundamental Principles and Applications

Transformation electromagnetics is a systematic design technique for optical and electromagnetic devices that enables novel wave-material interaction properties. The associated metamaterials technology for designing and realizing optical and electromagnetic devices can control the behavior of light and electromagnetic waves in ways that have...

Ballantine Books.How to Wow: Proven Strategies for Presenting Your Ideas, Persuading Your Audience, and Perfecting Your Image
Ballantine Books.How to Wow: Proven Strategies for Presenting Your Ideas, Persuading Your Audience, and Perfecting Your Image

“The invaluable advice in How to Wow guarantees your success in any meeting situation, from the boardroom to the breakfast table.”
–Keith Ferrazzi, author of Never Eat Alone

In today’s fast-paced world, where an elevator ride with your CEO can turn into an impromptu meeting, your lunch
...

Flip the Funnel: How to Use Existing Customers to Gain New Ones
Flip the Funnel: How to Use Existing Customers to Gain New Ones

Why customer retention is the new acquisition

If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...

Cyber Security Policy Guidebook
Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of...

Integrated Business Processes with ERP Systems
Integrated Business Processes with ERP Systems
As more and more businesses around the world adopt enterprise systems, it becomes increasingly important for students to develop a more process-centric perspective that refl ects the realities of the modern business environment in which they will work. Because business operations and enterprise systems are so tightly...
Database Design and Relational Theory: Normal Forms and All That Jazz
Database Design and Relational Theory: Normal Forms and All That Jazz
This book began life as a comparatively short chapter in a book called Database in Depth: Relational Theory for Practitioners (O’Reilly, 2005). That book was superseded by SQL and Relational Theory: How to Write Accurate SQL Code (O’Reilly, 2009), where the design material, since it was somewhat tangential to...
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Following the Trend: Diversified Managed Futures Trading
Following the Trend: Diversified Managed Futures Trading

During bull and bear markets, there is a group of hedge funds and professional traders which have been consistently outperforming traditional investment strategies for the past 30 odd years. They have shown remarkable uncorrelated performance and in the great bear market of 2008 they had record gains.  These traders are highly secretive...

Bayesian Models for Categorical Data (Wiley Series in Probability and Statistics)
Bayesian Models for Categorical Data (Wiley Series in Probability and Statistics)

The use of Bayesian methods for the analysis of data has grown substantially in areas as diverse as applied statistics, psychology, economics and medical science. Bayesian Methods for Categorical Data sets out to demystify modern Bayesian methods, making them accessible to students and researchers alike. Emphasizing the use of statistical...

Cloud and Virtual Data Storage Networking
Cloud and Virtual Data Storage Networking
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the opportunity to meet and speak with thousands of information technology (IT) professionals around the world, both in person and virtually via different venues. Even as that last book was being printed, the ideas to be found in this new book were coming...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy