Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Computer Graphics and Geometric Modelling: Implementation & Algorithms
Computer Graphics and Geometric Modelling: Implementation & Algorithms
Possibly the most comprehensive overview of computer graphics as seen in the context of geometric modelling, this two volume work covers implementation and theory in a thorough and systematic fashion. Computer Graphics and Geometric Modelling: Implementation and Algorithms, covers the computer graphics part of the field of geometric modelling and...
Metabolic Ecology: A Scaling Approach
Metabolic Ecology: A Scaling Approach

One of the first textbooks in this emerging important field of ecology.

Most of ecology is about metabolism: the ways that organisms use energy and materials. The energy requirements of individuals – their metabolic rates – vary predictably with their body size and temperature. Ecological interactions are
...

Handbook of Parallel Computing: Models, Algorithms and Applications (Chapman & Hall/Crc Computer & Information Science Series)
Handbook of Parallel Computing: Models, Algorithms and Applications (Chapman & Hall/Crc Computer & Information Science Series)
We live in an era in which parallel computing has become mainstream and very affordable. This is mainly because hardware costs have come down rapidly. With the advent of the Internet, we also experience the phenomenon of data explosion in every application of interest. Processing voluminous datasets is highly computation intensive. Parallel...
The Korean Peace Process and Civil Society: Towards Strategic Peacebuilding (Rethinking Peace and Conflict Studies)
The Korean Peace Process and Civil Society: Towards Strategic Peacebuilding (Rethinking Peace and Conflict Studies)
“This is a must-read book for anyone searching for insight into the peace process of the divided Korean peninsula. As a peace researcher and activist, the author highlights the role of civil society in making peacebuilding possible and sustainable on the Korean peninsula. This volume opens a new horizon to the study of...
Foundations for Analytics with Python
Foundations for Analytics with Python

If you’re like many of Excel’s 750 million users, you want to do more with your data—like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in...

Essentials of Mathematical Methods in Science and Engineering
Essentials of Mathematical Methods in Science and Engineering

A comprehensive introduction to the multidisciplinary applications of mathematical methods, revised and updated

The second edition of Essentials of Mathematical Methods in Science and Engineering offers an introduction to the key mathematical concepts of advanced calculus, differential equations, complex...

Head First Design Patterns
Head First Design Patterns

You're not alone. At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take...

Django: Web Development with Python
Django: Web Development with Python

About This Book

  • Explore the best practices to develop applications of a superior quality with Django framework
  • Unravel the common problems of web development in Django
  • This course teaches you major Django functions and will help you improve your skills by developing models, forms, views, and...
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Student's Guide to Calculus I
Student's Guide to Calculus I

This Student Guide i s exceptional, maybe even unique, among such guides in that its author, Fred Soon, was actually a student user of the textbook during one of the years we were writing and debugging the book. (He was one of the best students that year, by the way.) Because of h i s background, Fred has taken, i n the Guide, the point of...

Result Page: 243 242 241 240 239 238 237 236 235 234 233 232 231 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy