Home | Amazing | Today | Tags | Publishers | Years | Search 
Bayesian Data Analysis, Second Edition (Chapman & Hall/CRC Texts in Statistical Science)
Bayesian Data Analysis, Second Edition (Chapman & Hall/CRC Texts in Statistical Science)
This book is intended to have three roles and to serve three associated audiences: an introductory text on Bayesian inference star ting from first principles, a graduate text on effective current approaches to Bayesian modeling and computation in statistics and related fields, and a handbook of Bayesian meth ods in applied...
Seeing the Big Picture: Business Acumen to Build Your Credibility, Career, and Company
Seeing the Big Picture: Business Acumen to Build Your Credibility, Career, and Company

An MBA in 180 pages, Seeing the Big Picture simplifies the complexities of businesses large and small and shows you how a deep understanding of your company can help build the credibility and career you want. And it can make your work more fulfilling and purpose-driven by highlighting how you influence the success of your team,...

Cooperative Communications and Networking: Technologies and System Design
Cooperative Communications and Networking: Technologies and System Design
Over the past years, there has been a considerable research activity in the field of wireless cooperative communications and networking. By now, this field has reached a mature level and there is a definite need to organize research results and present them in a unified manner. This is precisely the objective and strength of...
Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
Programming is an art. Although traditional art imitates life, programming simulates life. Every abstract concept in programming, and to a great extent in the fi eld of computer science, has its roots in our daily life. For example, humans and possibly all other living forms were multiprocessing long before the term entered into...
Audel HVAC Fundamentals, Heating System Components, Gas and Oil Burners and Automatic Controls
Audel HVAC Fundamentals, Heating System Components, Gas and Oil Burners and Automatic Controls
The purpose of this series is to provide the layman with an introduction to the fundamentals of installing, servicing, troubleshooting, and repairing the various types of equipment used in residential and light-commercial heating, ventilating, and air conditioning (HVAC) systems. Consequently, it was written not only for the...
Fruit and Vegetable Processing: Improving Quality (Woodhead Publishing Series in Food Science, Technology and Nutrition)
Fruit and Vegetable Processing: Improving Quality (Woodhead Publishing Series in Food Science, Technology and Nutrition)
Fruit and vegetables are both major food products in their own right and key ingredients in many processed foods. Consumers increasingly require food products that preserve their nutritional value, retain a natural and fresh colour, flavour and texture, and contain fewer additives such as preservatives. These requirements pose...
Apple Pro Training Series: Final Cut Pro X Advanced Editing
Apple Pro Training Series: Final Cut Pro X Advanced Editing

 

This book takes a hands-on approach to using the software. It’s divided into projects— based on footage on the accompanying DVD—that teach you advanced techniques as you work through the lessons. Every exercise is designed to get you editing and creating effects professionally
...
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

Visual Models for Software Requirements (Best Practices (Microsoft))
Visual Models for Software Requirements (Best Practices (Microsoft))
Visual requirements models are one of the most effective ways to identify software requirements. They help the analyst to ensure that all stakeholders—including subject matter experts, business stakeholders, executives, and technical teams—understand the proposed solution. Visualization keeps...
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites
The combination of PHP and MySQL is the most convenient approach to dynamic, database-driven web design, holding its own in the face of challenges from integrated frameworks—such as Ruby on Rails—that are harder to learn. Due to its open source roots (unlike the competing Microsoft .NET framework), it is...
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences
Computer and Information Sciences: Proceedings of the 25th International Symposium on Computer and Information Sciences

Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...

Pro jQuery Mobile
Pro jQuery Mobile
jQuery Mobile is a new, simple to use, UI framework for building cross-platform Mobile Web applications. In a matter of minutes, you can create mobile applications (apps) that are optimized to run on nearly every phone, tablet, desktop, and e-reader device available today. That’s right, with a single jQuery Mobile codebase we...
Result Page: 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy