Home | Amazing | Today | Tags | Publishers | Years | Search 
Therapy After Terror: 9/11, Psychotherapists, and Mental Health
Therapy After Terror: 9/11, Psychotherapists, and Mental Health
"A licensed, clinical social worker, Seeley (anthropology, Columbia Univ.) offers a riveting, comprehensive examination of the work and experiences of psychotherapists following 9/11. [...] At the heart of the book is Seeley's discussion of "trauma contagion", a phenomenon she distinguishes from vicarious trauma. [...] Integrating...
The Names of Plants
The Names of Plants
The Names of Plants is an invaluable reference for botanists and horticulturalists. The first section gives an historical account of the significant changes in the ways that plants have been known and named. It documents the problems associated with an ever-increasing number of common names of plants, and the resolution of these problems through...
Expert Shell Scripting (Expert's Voice in Open Source)
Expert Shell Scripting (Expert's Voice in Open Source)

I learned the basics of programming when I was in school; I learned how to shell-script by example.

I’ve met and worked with many system administrators and other *NIX folks, each of whom has their own bag of tricks when it comes to managing a system, interacting with their environment, or coding a script. It’s
...

An Introduction to the Theory of Formal Languages and Automata
An Introduction to the Theory of Formal Languages and Automata
In the latter half of the 1950’s, Noam Chomsky began to develop mathematical models for the description of natural languages. Two disciplines originated in his work and have grown to maturity. The first of these is the theory of formal grammars, a branch of mathematics which has proven to be of great interest to information and computer...
Delivering Business Intelligence with Microsoft SQL Server(TM) 2/E 2008
Delivering Business Intelligence with Microsoft SQL Server(TM) 2/E 2008
Life is filled with decisions. Should I have the burger and fries or the salad for lunch? Should I get my significant other that new watch they’ve had their eye on, or should I buy them a new vacuum cleaner? Do I invest my holiday bonus or head for the casino? Should I buy this book or go browse the comics section? (Here is your first bit of...
Foundations of Computer Science: C Edition (Principles of Computer Science Series)
Foundations of Computer Science: C Edition (Principles of Computer Science Series)
Aho and Ullman have created a C version of their groundbreaking text. As in that text, this book combines the theoretical foundations of computing with essential discrete mathematics. It follows the same organizations as its predecessor, with all examples and exercises in C.

This book was motivated by the desire we and others have had to
...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Geocomputation and Urban Planning (Studies in Computational Intelligence)
Geocomputation and Urban Planning (Studies in Computational Intelligence)
Sixteen years ago, Franklin estimated that about 80% of data contain geo-referenced information. To date, the availability of geographic data and information is growing, together with the capacity of users to operate with IT tools and instruments. Spatial data infrastructures are growing and allow a wide number of users to rely on them. This growth...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
A major thrust of computer science is the design, analysis, implementation, and scientific evaluation of algorithms to solve critical problems. In addition, new challenges are being offered to computer scientists in the field of computational science and engineering, which includes challenging problems in computational biology, computational fluid...
Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

Omnipage Power!
Omnipage Power!
With substantially increased accuracy and the ability to convert both scanned documents and PDF files into editable text and images for use in computer software applications such as MS Word and Excel, OmniPage Pro 11 has become an essential tool for the digital workplace. "OmniPage Power!" is here to help you make maximum use of the...
Result Page: 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy