|
|
|
|
SAS Programming and Data Visualization Techniques: A Power User's Guide
SAS Programming and Data Visualization Techniques: A Power User’s Guide brings together a wealth of ideas about strategic and tactical solutions to everyday situations experienced when transferring, extracting, processing, analyzing, and reporting the valuable data you have at your fingertips. Best, you can achieve most of the... | | When Does Terrorism Work? (Extremism and Democracy)
This book examines the question of when terrorism works. Determining if political violence is effective and, if at all possible, when it is effective, is vital for both intellectual and practical reasons. The volume contains chapters from scholars who have been at the forefront of the efficaciousness debate and argues that terrorism... | | Ew 103, Tactical Battlefield communications Electronic WarfareThis is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals
The target audiences for this book, like the earlier two, are... |
|
The 2nd Digital RevolutionIn the 1990s I sat in the office of a CFO of what was then a Fortune 100 company. He was not happy about the annual technology bill. Back then – and for decades before – technology was tactical. He said something about technology being his last unmanaged expense. I gave him a list of 10 things we should do to improve... | | | | Games That Sell! (Wordware Game and Graphics Library)Analyzes successful games and translates this unique analysis into a book that details the do's and don'ts of effective game development and marketing.
About the Author Mark H. Walker is a veteran journalist, writer, and game designer. He has written more than 40 books about computer gaming, including Video... |
|
|
Implementing Domain-Driven Design
“For software developers of all experience levels looking to improve their results, and design and implement domain-driven enterprise applications consistently with the best current state of professional practice, Implementing Domain-Driven Design will impart a treasure trove of knowledge hard won within the DDD and... | | Security in Wireless Ad Hoc and Sensor NetworksThis book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and... | | CISSP For Dummies (Computer/Tech)Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying... |
|
|
Result Page: 8 7 6 5 4 3 2 1 |