Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Protection in a Profiled World
Data Protection in a Profiled World

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data...

The Mind of the Mathematician
The Mind of the Mathematician

What makes mathematicians tick? How do their minds process formulas and concepts that, for most of the rest of the world's population, remain mysterious and beyond comprehension? Is there a connection between mathematical creativity and mental illness?

In The Mind of the Mathematician, internationally famous mathematician Ioan James and...

Immobilized ?-Galactosidase-Mediated Conversion of Lactose: Process, Kinetics and Modeling Studies (Springer Theses)
Immobilized ?-Galactosidase-Mediated Conversion of Lactose: Process, Kinetics and Modeling Studies (Springer Theses)

This book describes the reaction rate profiles of the β-galactosidase-catalyzed conversion of lactose on the inner surface of a hollow fiber membrane, which is employed as an enzymatic reactor system. The reaction rate profiles were obtained by solving the mass transfer and kinetics of reaction in a 2-dimensional model...

UML for Systems Engineering: watching the wheels, 2nd Edition (IEE Professional Applications of Computing)
UML for Systems Engineering: watching the wheels, 2nd Edition (IEE Professional Applications of Computing)

Up until a few years ago there were over 150 different modelling languages available to software developers. This vast array of choice however, only served to severely hinder effective communication. Therefore, to combat this, every methodologist and many companies agreed to speak the same language, hence the birth of the unified modelling...

Core J2ME Technology
Core J2ME Technology
The J2ME platform is designed for devices with limited memory, display, and processing power including cellular phones, PDAs, and pagers. Core J2ME Technology & MIDP covers everything you need to develop powerful applications for this rapidly expanding wireless market.

Part I starts with an overview of J2ME, configurations, and
...
Industrial Control Systems: Advances and Applications, First Edition
Industrial Control Systems: Advances and Applications, First Edition
'It is a compilation of the best instrumentation and control techniques used in industry, providing interesting theoretical content as well as practical topics on planning, integration, and application.'
--Plant Engineering, 2003

This is a comprehensive, practical, easy-to-read book on process control, covering some of
...
Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)
Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)
How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their...
Why Service Stinks...and Exactly What to Do About It!
Why Service Stinks...and Exactly What to Do About It!

Customer service expert T. Scott Gross surveyed 10,000 very vocal consumers and talked one-on-one with service people around the globe with the hope of creating a psychological profile of the perfect customer service employee.

Gross’s new book Why Service Stinks contains the results of his research along with studies from...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Optimizing Applications on Cisco Networks
Optimizing Applications on Cisco Networks

Maximize the performance and availability of network applications and the network infrastructure with application performance management

  • Learn and understand the business case for application performance management

  • Understand how to...

Corel Paint Shop Pro X Digital Darkroom
Corel Paint Shop Pro X Digital Darkroom

Corel Paint Shop Pro X Digital Darkroom is an easy-to-follow, tutorial approach to using Paint Shop Pro in exactly the way home users want to use it - to manipulate your own images in ways that a local photo lab often does to create both practical and...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy