Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Aristotle's Method in Ethics: Philosophy in Practice
Aristotle's Method in Ethics: Philosophy in Practice
This book examines Aristotle's method in ethics from the vantage point of his broader conception of philosophy. Joseph Karbowski challenges longstanding dialectical orthodoxy and argues instead that, in his ethical treatises, Aristotle is seeking the first principles of a demonstrative ethical science, a science of human goodness, using an...
Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

Learner-Centered Theory and Practice in Distance Education: Cases From Higher Education
Learner-Centered Theory and Practice in Distance Education: Cases From Higher Education
Learner-Centered Theory and Practice in Distance Education: Cases From Higher Education brings the voice of the learning sciences to the study and design of distance learning. The contributors examine critical issues in the design of theoretically and pedagogically based distance education programs.

Eight distance education
...
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
"This book should undoubtedly be of great interest to students and researchers of morphology, syntax, computational linguistics, and natural language processing. The book provides an excellent systematics overivew of the current state-of-the-art of the field. The book includes extensive descriptions of the formal characterization of...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Error Control Coding: From Theory to Practice
Error Control Coding: From Theory to Practice
Error Control Coding: From Theory to Practice provides a concise introduction to basic coding techniques and their application. The fundamental concepts of coding theory are explained using simple examples with minimum use of complex mathematical tools. The selection of appropriate codes and the design of decoders are discussed.

...

Anarchy Alive!: Anti-Authoritarian Politics from Practice to Theory
Anarchy Alive!: Anti-Authoritarian Politics from Practice to Theory
Anarchist politics are at the heart of today’s most vibrant and radical social movements. From squatted social centres and community gardens to acts of sabotage and raucous summit blockades, anarchist groups and networks are spreading an ethos of direct action, non-hierarchical organizing and self-liberation that has redefined...
Innovation Passport: The IBM First-of-a-Kind (FOAK) Journey From Research to Reality
Innovation Passport: The IBM First-of-a-Kind (FOAK) Journey From Research to Reality

“Finally! A book that lays out a thorough yet workable path to collaborative innovation! With a highly readable style and using great examples, Frederich and Andrews describe the process by which IBM makes collaborative innovation work from a process, company, and customer standpoint. By following the guidelines...

Data Mining on Multimedia Data (Lecture Notes in Computer Science)
Data Mining on Multimedia Data (Lecture Notes in Computer Science)

The increasing use of computer technology in many areas of economic, scientific, and social life is resulting in large collections of digital data. The amount of data which is created on and stored in computers is growing from day to day. Electronic database facilities are common everywhere and can now be considered a standard technology....

Communicating with XML
Communicating with XML
XML (Extensible Markup Language) is the lingua franca in contemporary networked environments. It is intended to support communication between software modules, particularly on the Web, as well as communication between people involved in developing new XML-based solutions. Developing the new solutions for a specifi c domain or...
Extreme Programming and Agile Methods - XP/Agile Universe 2004: 4th Conference on Extreme Programming and Agile Methods, Calgary, Canada, August
Extreme Programming and Agile Methods - XP/Agile Universe 2004: 4th Conference on Extreme Programming and Agile Methods, Calgary, Canada, August
It was 1999 when Extreme Programming Explained was first published, making this year’s event arguably the fifth anniversary of the birth of the XP/Agile movement in software development. Our fourth conference reflected the evolution and the learning that have occurred in these exciting five years as agile practices have become...
unlimited object storage image
Result Page: 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy