Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Military Intelligence Blunders
Military Intelligence Blunders

This is a book that tries to tell the story of some recent events, all within living memory, from a different angle: intelligence. Most of us have read press accounts and books about the events that unfold on these pages. But very few of us have seen the events from the inside. The inside implies knowledge: and knowledge means power.

...

Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

A Chinese Bestiary : Strange Creatures from the Guideways Through Mountains and Seas
A Chinese Bestiary : Strange Creatures from the Guideways Through Mountains and Seas
A Chinese Bestiary presents a fascinating pageant of mythical creatures from a unique and enduring cosmography written in ancient China. The Guideways through Mountains and Seas, compiled between the fourth and first centuries b.c.e., contains descriptions of hundreds of fantastic denizens of mountains, rivers, islands, and seas,...
IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

Advanced Artificial Intelligence (Series on Intelligence Science)
Advanced Artificial Intelligence (Series on Intelligence Science)

Artificial Intelligence's long-term goal is to build the human level of artificial intelligence. AI was born 50 years ago, in the bumpy road has made encouraging progress, in particular, machine learning, data mining, computer vision, expert systems, natural language processing, planning, robotics and related applications have...

The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set

A comprehensive five-volume reference on the defining conflict of the second half of the 20th century, covering all aspects of the Cold War as it influenced events around the world.

• 1,299 entries covering all facets of the Cold War from its origins to its aftermath, including all political, diplomatic, military,...

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Science and Social Science
Science and Social Science
Is social science really a science at all, and if so in what sense? This is the first real question that any course on the philosophy of the social sciences must tackle. In this brief introduction, Malcolm Williams gives the students the grounding that will enable them to discuss the issues involved with confidence.

Is social science
...
The Entrepreneur's Guide to Customer Development: A cheat sheet to The Four Steps to the Epiphany
The Entrepreneur's Guide to Customer Development: A cheat sheet to The Four Steps to the Epiphany

“This is a must read for all startups and stakeholders.”
Steve Blank, author of The 4 Steps to the Epiphany, creator of Customer Development methodology

“The Entrepreneur’s Guide is an easy read. It is written in a conversational tone, doesn’t take itself too
...

Building a Data Warehouse: With Examples in SQL Server
Building a Data Warehouse: With Examples in SQL Server
Building a Data Warehouse: With Examples in SQL Server describes how to build a data warehouse completely from scratch and shows practical examples on how to do it. Author Vincent Rainardi also describes some practical issues he has experienced that developers are likely to encounter in their first data warehousing project, along with...
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
DW 2.0: The Architecture for the Next Generation of Data Warehousing (Morgan Kaufman Series in Data Management Systems)
First book on the new generation of data warehouse architecture, DW 2.0--by the "father of the data warehouse".

Data Warehousing has been around for 20 years and has become part of the information technology infrastructure. Data warehousing originally grew in response to the corporate need for information--not
...
The Dragonfly Effect: Quick, Effective, and Powerful Ways To Use Social Media to Drive Social Change
The Dragonfly Effect: Quick, Effective, and Powerful Ways To Use Social Media to Drive Social Change

Proven strategies for harnessing the power of social media to drive social change

Many books teach the mechanics of using Facebook, Twitter, and YouTube to compete in business. But no book addresses how to harness the incredible power of social media to make a difference. The Dragonfly Effect shows you how to tap...

Result Page: 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy