Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Continuity Management: Building an Effective Incident Management Plan
Business Continuity Management: Building an Effective Incident Management Plan

Whether an international corporation or a small business, developing and utilizing

a Business Continuity Management (BCM) Plan protects companies and their personnel, facilities, materials, and activities from the broad spectrum of risks that face businesses and government agencies on a daily basis, whether at home or
...
Encyclopedia of Energy Engineering and Technology - 3 Volume Set (Print Version) (v. 13)
Encyclopedia of Energy Engineering and Technology - 3 Volume Set (Print Version) (v. 13)

Using limited resources in sustainable ways, energy engineers and technologists have made people's lives comfortable and affordable with efficient and cost-effective technology, from air conditioners to waste fuels. But to accommodate the expanding world population, the global supply of energy has been increasingly strained. Energy...

PICAXE Microcontroller Projects for the Evil Genius
PICAXE Microcontroller Projects for the Evil Genius

WHIP UP SOME FIENDISHLY FUN PICAXE MICROCONTROLLER DEVICES

"Ron has worked hard to explain how the PICAXE system operates through simple examples, and I'm sure his easy-to-read style will help many people progress with their PICAXE projects."

This wickedly inventive guide shows you how to program,...

Panda3D 1.7 Game Developer's Cookbook
Panda3D 1.7 Game Developer's Cookbook

Panda3D is a free and open source game engine. It has been used successfully by hobbyists as well as big studios to create games ranging from quick prototypes to full-scale commercial MMOs. Panda3D makes it easy to use models, textures, and sounds to create impressive interactive experiences. With this book, you too will be able to leverage...

Building a Home Security System with Raspberry Pi
Building a Home Security System with Raspberry Pi

Build your own sophisticated modular home security system using the popular Raspberry Pi board

About This Book

  • This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
  • It covers the...
Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted by Moore’s law, gate density and design complexity on single integrated chip (IC) keep increasing in recent decades. The close to nanoscale fabrication process introduces more manufacturing errors. New failure mechanisms that are not covered...
Economics DeMYSTiFieD
Economics DeMYSTiFieD

All the information you need―quick, easy, and ON THE MONEY

ECON. Do these letters make you sweat? You’re not alone. From college freshmen to PhD students, economics tops the list of panic-inducing classes.

But help has arrived. Economics DeMYSTiFieD is a curriculum-based, self-teaching...

Sustainable Operations and Supply Chain Management (Wiley Series in Operations Research and Management Science)
Sustainable Operations and Supply Chain Management (Wiley Series in Operations Research and Management Science)

Sustainable Operations and Supply Chain Management addresses the most relevant topics of operations and supply chain management from the perspective of sustainability. The main focus is to provide a step by step guide for managerial decisions made along the product life-cycle, following a path made up of the following steps: product...

Ruling the Root: Internet Governance and the Taming of Cyberspace
Ruling the Root: Internet Governance and the Taming of Cyberspace

In Ruling the Root, Milton Mueller uses the theoretical framework of institutional economics to analyze the global policy and governance problems created by the assignment of Internet domain names and addresses. “The root” is the top of the domain name hierarchy and the Internet address space. It is the only point of...

Global E-government: Theory, Applications and Benchmarking
Global E-government: Theory, Applications and Benchmarking
Interest in e-government, both in industry and in academia, has grown rapidly over the past decade, and continues to grow. Global E-Government: Theory, Applications and Benchmarking is written by experts from academia and industry, examining the practices of e-government in developing and developed countries, presenting recent theoretical research...
Encyclopedia of Electronic Circuits Volume 2
Encyclopedia of Electronic Circuits Volume 2

Just about everyone involved in electronics has experienced the frustration of searching for the particular power supply, temperature control circuit, or audio power amplifier circuit that exactly fills a need. The Encyclopedia of Electronics Circuits, Volume 1 has changed all that. Volume 1 of this outstanding pair includes more than 1,300...

The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
The Networked Supply Chain: Applying Breakthrough BPM Technology to Meet Relentless Customer Demands
This cutting-edge book illustrates how to implement a new breakthrough BPM technology that makes the vision of the networked enterprise a reality. BPM is changing the competitive business landscape. This breakthrough technology provides businesses with the means to manage processes across systems, people, and organizations, providing...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy