Home | Amazing | Today | Tags | Publishers | Years | Search 
Energy Management Handbook, Sixth Edition
Energy Management Handbook, Sixth Edition
When the fi rst introduction to Energy Management Handbook was written in 1982, I was in college, worried more about how to repay student loans than anything else. But this is now.

This book lives to serve its readers. In helping to edit the book, it has been my goal to keep the material fresh, pertinent and useful. My approach has been
...
AdvancED Flex 3
AdvancED Flex 3
Whether you're a Flex 3 beginner or intermediate user, this book provides the necessary information to help you develop into an expert. Using a practical hands-on approach, it illustrates exactly how to create robust and scalable enterprise-grade Rich Internet Applications (RIAs).

The book is divided into three parts. The first part discusses...

Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
Solving PDEs in C++ (Computational Science and Engineering)
Solving PDEs in C++ (Computational Science and Engineering)
This comprehensive book not only introduces the C and C++ programming languages but also shows how to use them in the numerical solution of partial differential equations (PDEs). It leads the reader through the entire solution process, from the original PDE, through the discretization stage, to the numerical solution of the resulting algebraic...
Decomposition Methodology For Knowledge Discovery And Data Mining: Theory And Applications
Decomposition Methodology For Knowledge Discovery And Data Mining: Theory And Applications
The book presents an interesting and pleasant introduction to the topic, which can guide the reader to the knowledge of the existing decomposition methods, and to the choice of those most promising for the problems he has to face. -- Zentralblatt MATH

Data Mining is the science and technology of exploring data in
...
Encyclopedia of Information Communication Technology
Encyclopedia of Information Communication Technology
The Encyclopedia of Information Communication Technology (ICT) is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies.

A reference point for studies...

Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective optimization deals with solving problems having not only one, but multiple, often conflicting, criteria. Such problems can arise in practically every field of science, engineering and business, and the need for efficient and reliable solution methods is increasing. The task is challenging due to the fact that, instead of a single...
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations...
Designing Effective Web Surveys
Designing Effective Web Surveys
Designing Effective Web Surveys is a practical guide to designing Web surveys, based on empirical evidence and grounded in scientific research and theory. It is designed to guide survey practitioners in the art and science of developing and deploying successful Web surveys. It is not intended as a "cook book"; rather it is meant to get...
Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
The Design Analysis Handbook: A Practical Guide to Design Validation
The Design Analysis Handbook: A Practical Guide to Design Validation
If you need to create reliable, cost-effective, optimized designs, The Design Analysis Handbook provides a practical framework for integrating quality into the design process from start to finish. The methodology used is called Worst Case Analysis Plus (WCA+), a design-validation tool that demands thoroughness and analytical thinking by the user....
Oracle CRM On Demand Reporting (Osborne Oracle Press)
Oracle CRM On Demand Reporting (Osborne Oracle Press)

Your One-Stop Guide to Oracle CRM On Demand Reporting

Plan, build, and distribute data-rich business intelligence reports with ease. Oracle CRM On Demand Reporting details the entire report-building process and explains how to use the powerful features available in Answers On Demand to create and share...

Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy