Home | Amazing | Today | Tags | Publishers | Years | Search 
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project

Projects--especially complex ones--are inherently risky. Between time constraints, technical challenges, and resource issues, things can easily go wrong--making the identification of potential risks an essential component of every project manager's job. Fully updated and consistent with the Risk Management Professional (RMP) certification...

EJB 3 in Action
EJB 3 in Action

Summary

Building on the bestselling first edition, EJB 3 in Action, Second Edition tackles EJB 3.2 head-on, through numerous code samples, real-life scenarios, and illustrations. This book is a fast-paced tutorial for Java EE 6 business component development using EJB 3.2, JPA 2, and CDI. Besides covering...

Design and Operation of Automated Container Storage Systems (Contributions to Management Science)
Design and Operation of Automated Container Storage Systems (Contributions to Management Science)

The storage yard is the operational and geographical centre of most seaport container terminals. Therefore, it is of particular importance for the whole terminal system and plays a major role for trade and transport flows. One of the latest trends in container-storage operations is the automated Rail-Mounted-Gantry-Crane system, which...

MIMO Wireless Networks, Second Edition: Channels, Techniques and Standards for Multi-Antenna, Multi-User and Multi-Cell Systems
MIMO Wireless Networks, Second Edition: Channels, Techniques and Standards for Multi-Antenna, Multi-User and Multi-Cell Systems

This book is unique in presenting channels, techniques and standards for the next generation of MIMO wireless networks. Through a unified framework, it emphasizes how propagation mechanisms impact the system performance under realistic power constraints. Combining a solid mathematical analysis with a physical and intuitive approach to...

OpenMP in the Era of Low Power Devices and Accelerators: 9th International Workshop on OpenMP, IWOMP 2013, Canberra, Australia, September 16-18, 2013, Proceedings (Lecture Notes in Computer Science)
OpenMP in the Era of Low Power Devices and Accelerators: 9th International Workshop on OpenMP, IWOMP 2013, Canberra, Australia, September 16-18, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of the 9th International Workshop on OpenMP, held in Canberra, Australia, in September 2013. The 14 technical full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on proposed extensions to OpenMP, applications,...

Project Management for Environmental, Construction and Manufacturing Engineers: A Manual for Putting Theory into Practice
Project Management for Environmental, Construction and Manufacturing Engineers: A Manual for Putting Theory into Practice

As a companion to books on project-management theory, this book illustrates, in a down-to-earth, comprehensive style, how to put that theory into practice. In addition to the many examples that illustrate procedures, the book includes over 25 case studies, each one addressing a specific theme. Key topics, such as project selection,...

How to Make it Big in the Seminar Business
How to Make it Big in the Seminar Business

How to Make It Big in the Seminar Business is considered must have reading among consultants, speakers, and seminar leaders. Fully updated and revised, this new edition is packed with insider tips on determining fees, marketing, scheduling, presentation technologies, and much more. It features new chapters on using the Web and other...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Practical Hadoop Migration: How to Integrate Your RDBMS with the Hadoop Ecosystem and Re-Architect Relational Applications to NoSQL
Practical Hadoop Migration: How to Integrate Your RDBMS with the Hadoop Ecosystem and Re-Architect Relational Applications to NoSQL

Re-architect relational applications to NoSQL, integrate relational database management systems with the Hadoop ecosystem, and transform and migrate relational data to and from Hadoop components. This book covers the best-practice design approaches to re-architecting your relational applications and transforming your relational data to...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Understand the fundamental factors of data storage system performance and master an essential analytical skill using block trace via applications such as MATLAB and Python tools. You will increase your productivity and learn the best techniques for doing specific tasks (such as analyzing the IO pattern in a quantitative way, identifying the...
Algorithm Theory - SWAT 2002: 8th Scandinavian Workshop on Algorithm Theory, Turku, Finland, July 3-5, 2002 Proceedings (Lecture Notes in Computer Science)
Algorithm Theory - SWAT 2002: 8th Scandinavian Workshop on Algorithm Theory, Turku, Finland, July 3-5, 2002 Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the 8th Scandinavian Workshop on Algorithm Theory, SWAT 2002, held in Turku, Finland, in July 2002.
The 43 revised full papers presented together with two invited contributions were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on
...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy