Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

There’s a good reason project risk management is one of the most vital of the nine content areas of the Project Management Body of Knowledge®. Important projects tend to be time constrained, pose huge technical challenges, and suffer from a lack of adequate resources. It’s no wonder that project managers are increasingly focusing...

Learning PHP Data Objects
Learning PHP Data Objects
This book will introduce you to one of the most important extensions to PHP that are available, starting with PHP version 5.0—the PHP Data Objects, commonly known as PDO.

PHP grew in to a very popular web programming language due to its simplicity and ease of use. One of the key factors of this growing success is the built-in
...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

How to Lie With Statistics
How to Lie With Statistics
"There is terror in numbers," writes Darrell Huff in How to Lie with Statistics. And nowhere does this terror translate to blind acceptance of authority more than in the slippery world of averages, correlations, graphs, and trends. Huff sought to break through "the daze that follows the collision of statistics with the...
Artificial Neural Networks in Real-life Applications
Artificial Neural Networks in Real-life Applications
The analysis of the computational models developed up to the present day show that the
artificial neural networks (ANN) have certain limits as information processing paradigms.
We believe that these limitations may be due to the fact that the existing models neither
reflect certain behaviours of the neurons nor consider the
...
How Great Decisions Get Made: 10 Easy Steps for Reaching Agreement on Even the Toughest Issues
How Great Decisions Get Made: 10 Easy Steps for Reaching Agreement on Even the Toughest Issues

All too often, solving tough work issues can become a tug of war as clashing departments, priorities, personality styles, and other concerns threaten to destroy any possibility of a successful conclusion. But by sharing hopes, and focusing on information rather than debate, the path to agreement can become wonderfully clear.

How...

Low Temperature Electronics: Physics, Devices, Circuits, and Applications
Low Temperature Electronics: Physics, Devices, Circuits, and Applications

Low-temperature electronics has already been studied for more than five decades . Originally the main interest was in fundamental material properties at cryogenic temperatures . Although the real benefits of operating semiconductor devices were clearly demonstrated in the 1970s, a peak in activity occurred a decade later when the cryocompute...

For Your Body Only: Discover the Diet You Were Born to Eat
For Your Body Only: Discover the Diet You Were Born to Eat

Cracking the code to the perfect personalized diet—and a lifetime of super-health Have you ever wondered why a new diet is invented almost every other day, yet obesity levels and disease in this country remain at an all-time high? Have you wondered why the diet that works so well for your friend has no impact on you—or even makes...

Chemical Mechanical Polishing in Silicon Processing, Volume 63
Chemical Mechanical Polishing in Silicon Processing, Volume 63
In the engineering world, many ideas and plans are conceived in the information exchanges that occur over lunch. In the summer of 1997, one of the editors (Shin Hwa Li) was assigned to assist our CMP module at the Crolles facility of STMicroelectronics near Grenoble, France. One day, in the company cafeteria, while sitting near...
After the Genome: A Language for Our Biotechnological Future (Studies in Rhetoric & Religion)
After the Genome: A Language for Our Biotechnological Future (Studies in Rhetoric & Religion)

Biotechnological advancements during the last half-century have forced humanity to come to grips with the possibility of a post-human future. The ever-evolving opinions about how society should anticipate this biotechnological frontier demand a language that will describe our new future and discuss its ethics. After the Genome brings...

The Legal Protection of Databases: A Comparative Analysis
The Legal Protection of Databases: A Comparative Analysis
This book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers...
Decomposition Methods for Differential Equations: Theory and Applications
Decomposition Methods for Differential Equations: Theory and Applications
Decomposition Methods for Differential Equations: Theory and Applications describes the analysis of numerical methods for evolution equations based on temporal and spatial decomposition methods. It covers real-life problems, the underlying decomposition and discretization, the stability and consistency analysis of the decomposition...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy