Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Distributed Applications with Microsoft Visual Basic 6.0 MCSD Training Kit
Distributed Applications with Microsoft Visual Basic 6.0 MCSD Training Kit
For Visual Basic (VB) programmers seeking the Microsoft Certified Developer (MSCD) credential, Distributed Applications for Microsoft Visual Basic 6.0 MCSD Training Kit provides a good resource for the material you'll likely face on the test, "Distributing and Implementing Distributed Applications with Microsoft Visual Basic 6.0"...
The Method of Moments in Electromagnetics
The Method of Moments in Electromagnetics
Responding to the need for a clear, up-to-date introduction to the field, The Method of Moments in Electromagnetics explores surface integral equations in electromagnetics and presents their numerical solution using the method of moments (MOM) technique. It provides the numerical implementation aspects at a nuts-and-bolts level...
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
The last seven years have seen the field of artificial intelligence (AI) transformed. This transformation is not simple, nor has it yet run its course. The transformation has been generated by the emergence of expert systems. Whatever exactly these are or turn out to be, they first arose during the 1970s, with a triple claim: to be AI systems that...
Business Rules Applied: Building Better Systems Using the Business Rules Approach
Business Rules Applied: Building Better Systems Using the Business Rules Approach
From a bestselling author and expert--a soon-to-be classic on application development
Representing a significant change of focus in software engineering, the business rule approach to application development benefits all decision makers. Managers looking to take advantage of new opportunities will turn to business rules to implement
...
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job

A landmark book that blazed light on one of the business world's dirtiest secrets, The Bully at Work exposed the destructive, silent epidemic of workplace bullying that devastates the lives, careers, and families of millions. In this completely updated new edition based on an updated survey of workplace issues, the authors explore...

System Architecture with XML
System Architecture with XML
"The whole world is talking XML, and the ramifications of its universal adoption are only beginning to surface. Whole business models will be affected by it; whole new business interests are being pursued because of it. The software industry itself will be rocked by it more than it cares to admit. This is so because XML brings us into the...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Deciphering Growth (Research and Perspectives in Endocrine Interactions)
Deciphering Growth (Research and Perspectives in Endocrine Interactions)
An organism’s body size tells us a lot about how it makes a living, suggesting that body size is a key parameter in evolution. We outline three large-scale trends in body size evolution. Bergmann’s Rule is the tendency for warm-blooded species at high latitudes to be larger than their close relatives nearer the equator....
Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques (Massive Computing)
Data Mining and Knowledge Discovery Approaches Based on Rule Induction Techniques (Massive Computing)

This book will give the reader a perspective into the core theory and practice of data mining and knowledge discovery (DM and KD). Its chapters combine many theoretical foundations for various DM and KD methods, and they present a rich array of examples – many of which are drawn from real-life applications. Most of the theoretical...

An Introduction to Programming with Mathematica, Third Edition
An Introduction to Programming with Mathematica, Third Edition

"Essential...a welcome addition to the literature. The choice of topics and their presentation are lucidly informed by considerable experience. The writing style is straightforward and clear. The authors stick resolutely to their goal of producing an introductory text, not a complete treatment, on programming in Mathematica. As such it...

Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy