Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nonprofit Essentials: Recruiting and Training Fundraising Volunteers
Nonprofit Essentials: Recruiting and Training Fundraising Volunteers

Praise for Recruiting and Training Fundraising Volunteers

"Linda Lysakowski brings into focus the realities of enlisting volunteers to ensure success in a campaign. She clearly outlines logical steps that lead to inspiring passion in the volunteer, who is so essential to reaching a goal. I wish such a comprehensive
...

Parallel Programming in OpenMP
Parallel Programming in OpenMP
"This book will provide a valuable resource for the OpenMP community."

- Timothy G. Mattson, Intel Corporation

"This book has an important role to play in the HPC community-both for introducing practicing professionals to OpenMP and for educating students and professionals about parallel programming. I'm happy...

Mind Design II: Philosophy, Psychology, and Artificial Intelligence
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
"Ming Design II is a welcome update of its predecessor, itself a useful compendium on the philosophy of cognitive science. This new volume retains the intellectual foundations, and some discussions of classical AI built on them, while adding connectionism, situated AI, and dynamic systems theory as extra storeys. Which of these is...
Ransomware: Defending Against Digital Extortion
Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the...

The Princeton Companion to Mathematics
The Princeton Companion to Mathematics

This is a one-of-a-kind reference for anyone with a serious interest in mathematics. Edited by Timothy Gowers, a recipient of the Fields Medal, it presents nearly two hundred entries, written especially for this book by some of the world's leading mathematicians, that introduce basic mathematical tools and vocabulary; trace the...

Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond
Few events have had a more profound impact on the social and cultural upheavals of the Sixties than the psychedelic revolution spawned by the spread of LSD. This book for the first time tells the full and astounding story—part of it hidden till now in secret Government files—of the role the mind-altering drug played in our recent...
Excel Advanced Report Development
Excel Advanced Report Development
If you're a SQL programmer or an experienced Excel user, here at last is the ultimate resource on developing reporting solutions with Excel. Focused on report development using OLTP databases, this book is packed with comprehensive information on both technical and strategic aspects. You'll thoroughly examine the main features of Excel's reporting...
Mathematics for the Analysis of Algorithms
Mathematics for the Analysis of Algorithms

"The book presents a welcome selection and careful exposition of material that can be (and is) covered in a single course...In this reviewer's opinion, this would be an interesting text to use with a group of advanced students well-grounded in undergraduate mathematics and computer science, and would produce a valuable course for the...

Object-Oriented Design and Patterns
Object-Oriented Design and Patterns

This book is an introduction to object-oriented design and design patterns at an elementary level. It is intended for students with at least one semester of programming in an object-oriented language such as Java or C++.

An object-oriented design text that's student oriented too!

Now updated to reflect the
...

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Performance Evaluation and Benchmarking
Performance Evaluation and Benchmarking
It is a real pleasure and honor for us to present you this book titled
Performance Evaluation and Benchmarking. Performance evaluation and benchmarking
is at the heart of computer architecture research and development. Without
a deep understanding of benchmarks’ behavior on a microprocessor and
without efficient and
...
TCP/IP Unleashed (3rd Edition)
TCP/IP Unleashed (3rd Edition)

TCP/IP Unleashed, Third Edition, explains the features and complexities of the TCP/IP protocol suite in a comprehensive, logical format. The book is designed for easy reference and incorporates step-by-step guidelines and configuration examples to enhance the reader's learning experience. Our expert authors walk through the fundamentals of...

unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy