Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Etransformation in Governance: New Directions in Government and Politics
Etransformation in Governance: New Directions in Government and Politics

eTransformation in Governance: New Directions in Government and Politics is about transformation in government and governance due to the information society development. The book provides conceptual clarification of the e-transformation in governance, and presents empirical findings on the recent developments in Western countries. The...

Dengue Virus (Current Topics in Microbiology and Immunology)
Dengue Virus (Current Topics in Microbiology and Immunology)

Scientific research on dengue has a long and rich history. The literature has been touched by famous names in medicine- Benjamin Rush, Walter Reed, and Albert Sabin, to name a very few- and has been fertile ground for medical historians . The advances made in those early investigations are all the more remarkable for the limited tools available...

The New Workforce: Five Sweeping Trends That Will Shape Your Company's Future
The New Workforce: Five Sweeping Trends That Will Shape Your Company's Future

As a futurist, you can be fascinating at a cocktail party. Instead of dropping names, you drop facts and figures: We are expected to live well intoour 100s; the average age for young adults to marry in America is 30; the single male head of household is the fastest growing demographic group; and the...

Spatial AutoRegression (SAR) Model: Parameter Estimation Techniques (SpringerBriefs in Computer Science)
Spatial AutoRegression (SAR) Model: Parameter Estimation Techniques (SpringerBriefs in Computer Science)
Explosive growth in the size of spatial databases has highlighted the need for spatial data analysis and spatial data mining techniques to mine the interesting but implicit spatial patterns within these large databases. Extracting useful and interesting patterns from massive geo-spatial datasets is important for many application...
Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Cancer and Aging Handbook: Research and Practice
Cancer and Aging Handbook: Research and Practice

A state-of-the-art, multidisciplinary approach to cancer and aging

With the majority of cancers occurring in individuals over the age of 65 against a backdrop of an expanding aging population, there is an urgent need to integrate the areas of clinical oncology and geriatric care. This timely work tackles these issues...

Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Physical Computing: Sensing and Controlling the Physical World with Computers
Physical Computing: Sensing and Controlling the Physical World with Computers
We believe that the computer revolution has left most of you behind. Steve Jobs had similar thoughts when he founded Apple Computer and set out to build “computers for the rest of us.” The idea was to enable people who were not computer experts—like artists, educators, and children—to take advantage of the power of...
Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
How to Raise All the Money You Need for Any Business
How to Raise All the Money You Need for Any Business
In school many of us learned that water is the universal solvent. Yet when we get into the real world of business or income real estate we soon learn that — in most of our lives — money is the universal solvent!

So the biggest challenge you, as a beginning or experienced wealth builder, face is raising the money you need to
...
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Pivot Table Data Crunching (Business Solutions)
Pivot Table Data Crunching (Business Solutions)
Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author ...
unlimited object storage image
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy