Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced FileMaker Pro 5.5: Techinques for Developers with CDR (Wordware FileMaker Library)
Advanced FileMaker Pro 5.5: Techinques for Developers with CDR (Wordware FileMaker Library)
We almost never read forewords or introductions, so we’ll try to be as brief as possible. There were several reasons for writing this book. As time has gone by and FileMaker has evolved into a more sophisticated development tool, the need for more advanced FileMaker reference materials has grown as well. We felt that while...
Continuous-Time Markov Chains and Applications: A Two-Time-Scale Approach (Stochastic Modelling and Applied Probability)
Continuous-Time Markov Chains and Applications: A Two-Time-Scale Approach (Stochastic Modelling and Applied Probability)

This book gives a systematic treatment of singularly perturbed systems that naturally arise in control and optimization, queueing networks, manufacturing systems, and financial engineering. It presents results on asymptotic expansions of solutions of Komogorov forward and backward equations, properties of functional occupation measures,...

Finite-Time Stability and Control (Lecture Notes in Control and Information Sciences)
Finite-Time Stability and Control (Lecture Notes in Control and Information Sciences)

Finite-time stability (FTS) is a more practical concept than classical Lyapunov stability, useful for checking whether the state trajectories of a system remain within pre-specified bounds over a finite time interval. In a linear systems framework, FTS problems can be cast as convex optimization problems and solved by the use of effective...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Transition to Renewable Energy Systems
Transition to Renewable Energy Systems

In the wake of global climate change and increasing geopolitical instability of oil supply an accelerated transition to renewable energy system gets increasingly important, if not unavoidable.

This book encompasses reports of select energy strategies as well as in-depth technical information of the already or potentially involved...

Gitolite Essentials
Gitolite Essentials

Leverage powerful branch and user access control with Git for your own private collaborative repositories

Overview

  • Learn to manage the many repositories and the users accessing these repositories in the Git server
  • Walks you through the most important ideas and concepts in Gitolite supported...
Effective Monitoring and Alerting: For Web Operations
Effective Monitoring and Alerting: For Web Operations

With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to...

Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Discover how Apache Hadoop can unleash the power of your data. This comprehensive resource shows you how to build and maintain reliable, scalable, distributed systems with the Hadoop framework -- an open source implementation of MapReduce, the algorithm on which Google built its empire. Programmers will find details for analyzing...

Animal Models of Cognitive Impairment (Frontiers in Neuroscience)
Animal Models of Cognitive Impairment (Frontiers in Neuroscience)

The costs associated with a drug’s clinical trials are so significant that it has become necessary to validate both its safety and efficacy in animal models prior to the continued study of the drug in humans.

Featuring contributions from distinguished researchers in the field of cognitive therapy research, Animal Models of...

Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

Control Theory for Engineers: A Primer (Environmental Science and Engineering / Environmental Engine)
Control Theory for Engineers: A Primer (Environmental Science and Engineering / Environmental Engine)

Control Theory is at the heart of information and communication technologies of complex systems. It can contribute to meeting the energy and environmental challenges we are facing.

The textbook is organized in the way an engineer classically proceeds to solve a control problem, that is, elaboration of a mathematical model capturing...

Foundations of Multithreaded, Parallel, and Distributed Programming
Foundations of Multithreaded, Parallel, and Distributed Programming

Greg Andrews teaches the fundamental concepts of multithreaded, parallel and distributed computing and relates them to the implementation and performance processes. He presents the appropriate breadth of topics and supports these discussions with an emphasis on performance. Features *Emphasizes how to solve problems, with correctness the...

unlimited object storage image
Result Page: 746 745 744 743 742 741 740 739 738 737 736 735 734 733 732 731 730 729 728 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy