Home | Amazing | Today | Tags | Publishers | Years | Search 
Practice Standard for Work Breakdown Structures: Second Edition
Practice Standard for Work Breakdown Structures: Second Edition

The Project Management Institute, Inc. (PMI) standards and guideline publications, of which the document contained herein is one, are developed through a voluntary consensus standards development process. This process brings together volunteers and/or seeks out the views of persons who have an interest in the topic covered by this...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Bandwidth Extension of Speech Signals (Lecture Notes in Electrical Engineering)
Bandwidth Extension of Speech Signals (Lecture Notes in Electrical Engineering)
The idea for this book was formed during the doctorate of Bernd Iser. Bernd Iser was working on efficient and robust bandwidth extension algorithms in hands-free systems for Harman/Becker Automotive Systems. It turned out that bandwidth extension of speech signals was a topic of appreciable interest, where lots of scientific...
Testing of Genetically Modified Organisms in Foods
Testing of Genetically Modified Organisms in Foods

Examine several methods of testing for genetically modified organisms and the reasons behind their strict regulation!

Testing of Genetically Modified Organisms in Foods is the first study of the screening methods and tools utilized for determining the presence of genetically modified organisms (GMOs) in food products. Leading
...

12 Essential Skills for Software Architects
12 Essential Skills for Software Architects
As you start reading this book, I hope you are prepared to keep an open mind and are willing to try some new approaches to your daily life.

My name is Dave Hendricksen, and I have the privilege of being a software architect for Thomson Reuters, where the focus of my work is on producing intelligent legal
...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology
Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology

In Pro JavaFX 2: A Definitive Guide to Rich Clients with Java Technology, Jim Weaver, Weiqi Gao, Stephen Chin, Dean Iverson, and Johan Vos show you how you can use the JavaFX platform to create rich-client Java applications. You'll see how JavaFX provides a powerful Java-based UI platform capable...

A Practical Guide for SystemVerilog Assertions
A Practical Guide for SystemVerilog Assertions
When Gateway Design Automation, Inc. created Verilog in the mid- 1980's, the process of integrated circuit design was very different than it is today. The role of Verilog, as well as its capability, has evolved since its inception into today's SystemVerilog.

SystemVerilog language consists of three categories of...

An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications

An Introduction to LTE explains the technology used by 3GPP Long Term Evolution. The book covers the whole of LTE, both the techniques used for radio communication between the base station and the mobile phone, and the techniques used for signalling communication and data transport in the evolved packet core. It avoids unnecessary...

Nanostructure control of materials
Nanostructure control of materials
The World is confronted with a plethora of potentially disruptive technologies – some, such as nanotechnology, will inevitably challenge our cherished social, economic and industrial stability over the next two decades. Rational design and manufacture of materials properties through nanostructure control will profoundly...
How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO
How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO

In just under a decade, Facebook has gone from a Harvard prodigy's dorm-room experiment to an essential part of the social life of hundreds of millions of children, teens, and adults across the globe. It's no surprise, then, that the company has been the subject of countless magazine articles, books, and even movies. But despite the...

Visual Basic 2012 Programmer's Reference
Visual Basic 2012 Programmer's Reference
IT HAS BEEN SAID THAT SIR ISAAC NEWTON was the last person to know everything. He was an accomplished physicist (his three laws of motion were the basis of classical mechanics, which defi ned astrophysics for three centuries), mathematician (he was one of the inventors of calculus and developed Newton’s Method for fi nding...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy