Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sediment Compaction and Applications in Petroleum Geoscience (Advances in Oil and Gas Exploration & Production)
Sediment Compaction and Applications in Petroleum Geoscience (Advances in Oil and Gas Exploration & Production)
This book discusses how sediments compact with depth and applications of the compaction trends. Porosity reduction in sediment conveniently indicates the degree of sediments compacted after deposition. Published empirical curves- the compaction curves- are depth-wise porosity variation through which change in pore spaces from sediment surface to...
Mastering Redmine - Second Edition
Mastering Redmine - Second Edition

Key Features

  • Learn Redmine through the basic topics to the mastering ones
  • Customize Redmine without breaking upgrade compatibility
  • Become an expert of Redmine after having read this comprehensive guide with tips, tricks and best practices.

Book Description

...

Entrepreneurship Three Volumes: The Engine of Growth (Praeger Perspectives) (v. 1-3)
Entrepreneurship Three Volumes: The Engine of Growth (Praeger Perspectives) (v. 1-3)
“This three-volume set brings together 32 essays exploring the topic of entrepreneurship. The first volume explores entrepreneurship as a form of human action, examining the influence of various factors on entrepreneurial behavior, including cognition, risk, social capital, institutions, immigration and ethnicity, and gender. The second...
Microsoft Office Project 2003 Bible
Microsoft Office Project 2003 Bible
Managing projects can be as exciting as scheduling the next space shuttle or as mundane as planning routine production-line maintenance. A project can be as rewarding as striking oil or as disastrous as the maiden voyage of the Titanic. Projects can have budgets of $5 or $5,000,000. One thing that all projects have in common, however, is their...
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

What is security? Is it a mindset? Is it a measurable and actionable posture or position? Or is it a bit of both? People, as a race, learn from doing; they learn by example. Ingrained into our psyche is a process that builds new information upon previous knowledge as we learn. As Isaac Newton said, “If I have seen further than...

The DFT: An Owners' Manual for the Discrete Fourier Transform
The DFT: An Owners' Manual for the Discrete Fourier Transform
Just as a prism separates white light into its component bands of colored light, so the discrete Fourier transform (DFT) is used to separate a signal into its constituent frequencies. Just as a pair of sunglasses reduces the glare of white light, permitting only the softer green light to pass, so the DFT may be used to modify a signal to achieve a...
Agile Testing: A Practical Guide for Testers and Agile Teams
Agile Testing: A Practical Guide for Testers and Agile Teams

We were early adopters of Extreme Programming (XP), testing on XP teams that weren’t at all sure where testers or their brand of testing fit in. At the time, there wasn’t much in the agile (which wasn’t called agile yet) literature about acceptance testing, or how professional testers might contribute. We learned not...

The Innovation Butterfly: Managing Emergent Opportunities and Risks During Distributed Innovation (Understanding Complex Systems)
The Innovation Butterfly: Managing Emergent Opportunities and Risks During Distributed Innovation (Understanding Complex Systems)

Product and service innovations are the result of mutually interacting creative and coordination tasks within a system that has to balance technical decisions, marketplace taste, personnel management, and stakeholder commitment. The constituent elements of such systems are often scattered across multiple firms and across the globe and...

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
Nuclear Energy Leadership: Lessons Learned from US Operators
Nuclear Energy Leadership: Lessons Learned from US Operators

The nuclear industry has quietly evolved over the past 30 years to become one of the safest and most reliable low-cost producers of electricity. 

Mary Jo Rogers's new book, Nuclear Energy Leadership: Lessons Learned from US Operators, provides helpful suggestions as well as useful tools drawn from the best of the nuclear
...
Hydrocarbon Potential in Southeastern United States: A Review (SpringerBriefs in Earth Sciences)
Hydrocarbon Potential in Southeastern United States: A Review (SpringerBriefs in Earth Sciences)
With respect to the vital work of maintaining and increasing much needed petroleum reserves within the continental United States, the Southeast is intriguing because it has been under-explored for many years at the expense of far more promising areas such as the Gulf Coast. While critics may contend that the overall geology of the Southeastern...
Troubleshooting Windows 2000 TCP/IP
Troubleshooting Windows 2000 TCP/IP
W2Knews Electronic Newsletter, March 13, 2000
...guides for planning, testing and deploying a W2K TCP/IP network. A great troubleshooting help when you have connectivity problems.

TCP/IP is a set of protocols developed to allow computers to share resources across a network.
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy