Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to Interwoven TeamSite (Definitive Guides)
The Definitive Guide to Interwoven TeamSite (Definitive Guides)

Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs....

A Course in Real Analysis
A Course in Real Analysis

A Course in Real Analysis provides a firm foundation in real analysis concepts and principles while presenting a broad range of topics in a clear and concise manner. This student-oriented text balances theory and applications, and contains a wealth of examples and exercises. Throughout the text, the authors adhere to the idea that most...

Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)

Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each...

The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)
The Pillars of Computation Theory: State, Encoding, Nondeterminism (Universitext)

The abstract branch of theoretical computer science known as Computation Theory typically appears in undergraduate academic curricula in a form that obscures both the mathematical concepts that are central to the various components of the theory and the relevance of the theory to the typical student. This regrettable situation is due largely...

Mobile Backhaul
Mobile Backhaul

Comprehensive coverage of IP/MPLS/Ethernet backhaul technologies and solutions for 3GPP mobile network systems such as LTE, HSPA and GPRS

Focusing on backhaul from a radio network viewpoint, Mobile Backhaul combines perspectives on mobile networks and transport network technologies, focusing on mobile backhaul specific...

Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World
Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World

Applied Corporate Finance fills a gap in the existing resources available to students and professionals needing an academically rigorous, yet practically orientated, source of knowledge about corporate finance. Written by an expert in investment analysis, this textbook leads readers to truly understand the principles behind corporate...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Communicating Data with Tableau
Communicating Data with Tableau

Go beyond spreadsheets and tables and design a data presentation that really makes an impact. This practical guide shows you how to use Tableau Software to convert raw data into compelling data visualizations that provide insight or allow viewers to explore the data for themselves.

Ideal for analysts, engineers,...

Principles of Renal Physiology
Principles of Renal Physiology

A good knowledge of renal physiology is essential to the understanding of many disease states. The purpose of the book is to set out the principles of renal physiology and normal renal function. Now in its 30th year of continuous publication, this new edition offers a logical progression through renal physiology and pathophysiology. In...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Magnetic Resonance Tomography
Magnetic Resonance Tomography

With an incredible 2400 illustrations, and written by a multitude of international experts, this book provides a comprehensive overview of both the physics and the clinical applications of MRI, including practical guidelines for imaging. The authors define the importance of MRI in the diagnosis of several disease groups in comparison or...

Phenomenology of Space and Time: The Forces of the Cosmos and the Ontopoietic Genesis of Life: Book Two (Analecta Husserliana)
Phenomenology of Space and Time: The Forces of the Cosmos and the Ontopoietic Genesis of Life: Book Two (Analecta Husserliana)

This work celebrates the investigative power of phenomenology to explore the phenomenological sense of space and time in conjunction with the phenomenology of intentionality, the invisible, the sacred, and the mystical. It examines the course of life through its ontopoietic genesis, opening the cosmic sphere to logos. The work also explores,...

unlimited object storage image
Result Page: 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy