Home | Amazing | Today | Tags | Publishers | Years | Search 
Business Etiquette For Dummies
Business Etiquette For Dummies

Make no mistake, etiquette is as important in business as it is in everyday life — it’s also a lot more complicated. From email and phone communications to personal interviews to adapting to corporate and international cultural differences, Business Etiquette For Dummies, 2nd Edition, keeps you on your best...

Practical Guide to the Packaging of Electronics, Second Edition: Thermal and Mechanical Design and Analysis
Practical Guide to the Packaging of Electronics, Second Edition: Thermal and Mechanical Design and Analysis

As the demand for packaging more electronic capabilities into smaller packages rises, product developers must be more cognizant of how the system configuration will impact its performance. Practical Guide to the Packaging of Electronics: Second Edition, Thermal and Mechanical Design and Analysis provides a...

System Engineering and Automation: An Interactive Educational Approach
System Engineering and Automation: An Interactive Educational Approach

This book provides insight and enhanced appreciation of analysis, modeling and control of dynamic systems. The reader is assumed to be familiar with calculus, physics and some programming skills. It might develop the reader’s ability to interpret physical significance of mathematical results in system analysis. The book also prepares...

Data Management and Query Processing in Semantic Web Databases
Data Management and Query Processing in Semantic Web Databases

The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Experience and Knowledge Management in Software Engineering
Experience and Knowledge Management in Software Engineering

Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific...

VCP4 Exam Cram: VMware Certified Professional (2nd Edition)
VCP4 Exam Cram: VMware Certified Professional (2nd Edition)

Virtualization is one of the hottest topics in the tech industry today. The leader in the virtualization space at the present time is without a doubt VMware with its virtual infrastructure offering. As VMware software began to take its place in the data center and demand respect in the industry, the need for a...

Wireless Communications (Wiley - IEEE)
Wireless Communications (Wiley - IEEE)

"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the...

Using iTunes 10
Using iTunes 10

For 10 years, iTunes has brought listening pleasure to people’s computers. Originally introduced in January 2001, the first version of iTunes worked only with Mac OS 9 operating systems, but later that year, Apple added support for OS X and for iPods—and that’s when iTunes really took off. Subsequent versions of the...

Numerical Methods, Algorithms and Tools in C#
Numerical Methods, Algorithms and Tools in C#

Today, more than at any other time in the history of mankind, computers are increasingly and successfully being exploited to gain a better understanding of our physical world and as a result, also deepen our appreciation and reverence for God’s Creation. Consequently, as computers evolve, so must the means to control them through...

Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)
Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)

Grid Computing was a vision of using and sharing computers and data in the early 1990s. The integration, coordination, and sharing of computer resources which are geographically disperse among different physical domains and organizations became an every day reality. This emerging infrastructure aims to provide a mechanism for sharing...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Result Page: 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy