Home | Amazing | Today | Tags | Publishers | Years | Search 
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
In recent years, federal oversight of public expenditures has sought to integrate performance and budgeting. Notably, the Government Performance and Results Act (GPRA) was passed in 1993 “in response to questions about the value and effectiveness of federal programs” (GAO, 1997, p. 11). GPRA and other mandates...
Principles and Applications of Fluorescence Spectroscopy
Principles and Applications of Fluorescence Spectroscopy
With reference to absorption spectroscopy,we deal herewith photon absorption by electrons distributed within specific orbitals in a population of molecules. Upon absorption, one electron reaches an upper vacant orbital of higher energy. Thus, light absorption would induce the molecule excitation. Transition from ground to excited...
Computational Chemistry: Reviews of Current Trends
Computational Chemistry: Reviews of Current Trends
There is no doubt that many of the readers of this book series wonder how the research/computational facilities will look like in the near future. It seems that the efficiency and compactness of the silicon-based computers are almost exhausted, and for significant progress one has to look for alternative solutions. A very...
Safe C++: How to avoid common mistakes
Safe C++: How to avoid common mistakes
Astute readers such as yourself may be wondering whether the title of this book, Safe C++, presumes that the C++ programming language is somehow unsafe. Good catch! That is indeed the presumption. The C++ language allows programmers to make all kinds of mistakes, such as accessing memory beyond the bounds of an...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Mathematical Methods in Image Reconstruction (Monographs on Mathematical Modeling and Computation)
Mathematical Methods in Image Reconstruction (Monographs on Mathematical Modeling and Computation)

Since the advent of computerized tomography in radiology, many imaging techniques have been introduced in medicine, science, and technology. This book describes the state of the art of the mathematical theory and numerical analysis of imaging. The authors survey and provide a unified view of imaging techniques, provide the necessary...

Professional Microsoft SQL Server 2012 Administration
Professional Microsoft SQL Server 2012 Administration

SQL SERVER 2012 REPRESENTS A SIZABLE jump forward in scalability, performance, and usability for the DBA, developer, and business intelligence (BI) developer. It is no longer unheard of to have 40-terabyte databases running on a SQL Server. SQL Server administration used to just be the job of a database administrator (DBA), but as SQL Server...

MOS 2010 Study Guide for Microsoft® Excel
MOS 2010 Study Guide for Microsoft® Excel

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use...

iOS Programming: The Big Nerd Ranch Guide (3rd Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (3rd Edition) (Big Nerd Ranch Guides)

 Updated and expanded to cover iOS 5 and Xcode 4.3, iOS Programming: The Big Nerd Ranch Guide leads you through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, you will have the understanding, the know-how, and the confidence you need to tackle iOS projects of your own....

Statistical Performance Analysis and Modeling Techniques for Nanometer VLSI Designs
Statistical Performance Analysis and Modeling Techniques for Nanometer VLSI Designs
As VLSI technology scales into nanometer regime, chip design engineering faces several challenges. One profound change in the chip design business is that engineers cannot realize the design precisely into the silicon chips. Chip performance, manufacture yield, and lifetime thereby cannot be determined accurately at the design...
Next Generation Photovoltaics: High Efficiency through Full Spectrum Utilization (Series in Optics and Optoelectronics)
Next Generation Photovoltaics: High Efficiency through Full Spectrum Utilization (Series in Optics and Optoelectronics)
This book results from a meeting that took place in Cercedilla, Madrid, Spain in March 2002. The meeting was about new ideas that could lead us to better use of the solar spectrum with the ultimate goal of achieving superior photovoltaic devices and, consequently, a reduction in their price. The meeting, despite being short,...
Result Page: 126 125 124 123 122 121 120 119 118 117 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy