Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Wind Power Technology: Theory, Deployment and Optimisation
Understanding Wind Power Technology: Theory, Deployment and Optimisation

Wind energy technology has progressed enormously over the last decade. In coming years it will continue to develop in terms of power ratings, performance and installed capacity of large wind turbines worldwide, with exciting developments in offshore installations.

Designed to meet the training needs of wind engineers, this...

Information Technology Policy and the Digital Divide: Lessons for Developing Countries
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations...
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018): Volume IV: Organizational Design and Management (ODAM), ... in Intelligent Systems and Computing)

This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...

Effects of Pollution on Fish: Molecular Effects and Population Responses
Effects of Pollution on Fish: Molecular Effects and Population Responses
In April l999 an article appeared in Fishing News under the headline ‘Dredging and pollution hit stocks far more than fishing’. The article reported on claims made by an environmental group that these two anthropogenic impacts are causing a far greater decline of fish stocks in the North Sea than ‘supposed overfishing’ and...
OECD Information Technology Outlook 2010
OECD Information Technology Outlook 2010

The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...

MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
Research Directions in Data and Applications Security XVIII
Research Directions in Data and Applications Security XVIII

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and...

The 3rd International Workshop on Intelligent Data Analysis and Management (Springer Proceedings in Complexity)
The 3rd International Workshop on Intelligent Data Analysis and Management (Springer Proceedings in Complexity)

These papers on Intelligent Data Analysis and Management (IDAM) examine issues related to the research and applications of Artificial Intelligence techniques in data analysis and management across a variety of disciplines. The papers derive from the 2013 IDAM conference in Kaohsiung ,Taiwan. It is an interdisciplinary research field involving...

Crossborder Care: Lessons from Central Europe
Crossborder Care: Lessons from Central Europe

This book analyses the circular migration of care workers in Central Europe using the example of Slovak carers in 24-hour care provision for the elderly in Austria. Challenging analyses that focus primarily on care drain and care regimes, Bahna and Sekulová supplement quantitative methodology with qualitative fieldwork to...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)

This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...

Nothing to Hide: The False Tradeoff between Privacy and Security
Nothing to Hide: The False Tradeoff between Privacy and Security

"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to...

unlimited object storage image
Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy