Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essential Tools for Operations Management: Tools, Models and Approaches for Managers and Consultants
Essential Tools for Operations Management: Tools, Models and Approaches for Managers and Consultants

The third book in the Essential Tools For series… on the topic of Operations Management

Based on Simon Burtonshaw-Gunn's successful The Essential Management Toolbox, this book focuses in greater depth on the topic of Operations Management. This third book covers the areas of marketing, CRM and Product...

Image Processing with ImageJ
Image Processing with ImageJ

Discover the incredible possibilities of ImageJ, from basic image processing to macro and plugin development

Overview

  • Learn how to process digital images using ImageJ and deal with a variety of formats and dimensions, including 4D images
  • Understand what histograms, region of interest, or...
The Evolution of the Eye
The Evolution of the Eye

With fascinating, spectacularly beautiful images, the book piques readers’ curiosity about the diversity of visual organs. This book is the result of a dual approach – scientific as well as aesthetic. The compelling images are accompanied by an easy-to-read, understandable text, aimed at both scientists and the educated public,...

Programming Bitcoin: Learn How to Program Bitcoin from Scratch
Programming Bitcoin: Learn How to Program Bitcoin from Scratch

Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch. You’ll learn how to work with the basics, including the math, blocks, network, and...

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)

The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) is a one-of-a-kind integration text and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft Exam 70-214 objectives.

  • Completely Guaranteed Coverage of All...
A Course in Computational Number Theory (Key Curriculum Press)
A Course in Computational Number Theory (Key Curriculum Press)

A Course in Computational Number Theory uses the computer as a tool for motivation and explanation. The book is designed for the reader to quickly access a computer and begin doing personal experiments with the patterns of the integers. It presents and explains many of the fastest algorithms for working with integers. Traditional topics are...

Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies
Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies

Cost optimal and nearly zero energy performance levels are principles initiated by the European Union’s (EU) Energy Performance of Buildings Directive which was recast in 2010. These will be major drivers in the construction sector in the next few years, because all new buildings in the EU from 2021 onwards are expected to be nearly...

PGP: Pretty Good Privacy
PGP: Pretty Good Privacy

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not...

Hybrid Cloud for Architects: Build robust hybrid cloud solutions using AWS and OpenStack
Hybrid Cloud for Architects: Build robust hybrid cloud solutions using AWS and OpenStack

Build your own hybrid cloud strategy with this comprehensive learning guide.

Key Features

  • Build a hybrid cloud strategy for your organization with AWS and OpenStack
  • Leverage Hybrid Cloud to design a complex deployment pipeline
  • Learn to implement security...
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility

Never has ethical business conduct received as much attention and focus as it does at present, in the wake of the far-reaching financial and societal effects of the dramatic collapses that have thundered through Corporate America. Whether your company is private, publicly-held, works with the government – either contractually or through...

Accessing and Browsing Information and Communication
Accessing and Browsing Information and Communication
This book contends that accessing and browsing information and communication are multidimensional and consequential aspects of the information user’s entire experience and of general human behavior. Problems in information creation, processing, transmittal, and use often arise from an incomplete conceptualization of the "information...
unlimited object storage image
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy