Home | Amazing | Today | Tags | Publishers | Years | Search 
Diagnosing Your Health Symptoms For Dummies®
Diagnosing Your Health Symptoms For Dummies®

Everybody develops new health problems sometimes. Often, these problems are familiar and not especially worrying. When you wake up with a slightly sore throat or get a mild headache after a long, busy day, for example, the chances are that you’ve already had this kind of thing before and you know instinctively what to do about it. You...

Food 2.0: Secrets from the Chef Who Fed Google
Food 2.0: Secrets from the Chef Who Fed Google

In a cutting edge cookbook for the Internet generation, Google s legendary founding super-chef, Charlie Ayers, tells you everything you need to know about the newest nutrition buzzword: brainfood. He outlines the basics on how the right foods can transform your mind and body, and then teaches you how to stock your kitchen with the healthiest...

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

How to Solve It: Modern Heuristics
How to Solve It: Modern Heuristics

This is not a book about algorithms . Certainly, it is full of algorithms , but that 's not what this book is about . This book is about possibilities . Its purpose is to present you not only with the prerequisite mandatory knowledge of the available problem-solving techniques , but more importantly to expand your ability to frame...

The SIM Guide to Enterprise Architecture
The SIM Guide to Enterprise Architecture

It is amusing that the first part of this book to be read is the last part to be written. It provides, however, an opportunity to share with you a little about how writing and editing this book has changed my thinking not just about enterprise architecture (EA), or about the role of information technology (IT) and IT professionals in...

Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)
Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)

Mathematics and mathematical modelling are of central importance in computer science. For this reason the teaching concepts of mathematics in computer science have to be constantly reconsidered, and the choice of material and the motivation have to be adapted. This applies in particular to mathematical analysis, whose significance has to be...

Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)
Knowledge in Formation: A Computational Theory of Interpretation (Cognitive Technologies)

With knowledge representation we face more or less the same problem as Augustine (354–430) when thinking about time: if nobody asks what it is, it seems clear enough, but being asked it proves to be very difficult to provide an answer.

At the beginning of our research we thought that a solution for the problem of...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
HTML5 Multimedia Development Cookbook
HTML5 Multimedia Development Cookbook

Maybe you've heard the story—or probably urban legend—about the university that didn't lay any grass or pour any concrete when it first opened, leaving the campus grounds as solid dirt. Then, as students began to traverse the campus from one class to the next, campus planners mapped the common paths they took, and then...

Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)
Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)

This comprehensive guide to the strategic management of information systems within business and public sector organizations integrates the two, often disparate, domains of strategic management and information systems.  Focusing on managing information systems within a broader organizational context, it covers key issues...

Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps
Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps

Gamification may be a new term, but the idea of using game-thinking and game mechanics to solve problems and engage audiences isn’t exactly new. The military has been using games and simulations for hundreds (if not thousands) of years, and the U.S. military has been a pioneer in the use of video games across branches. Three...

Architecture-Based Design of Multi-Agent Systems
Architecture-Based Design of Multi-Agent Systems

One of the most important things an architect can do is reflection. That is, examine systems, organizations, people and ask “What alternatives were considered and why was that particular decision made?” Thinking about the response gives an architect insight into the motivations and decision processes that others have used...

Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy