Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Reliability: Fundamentals and Applications
Design Reliability: Fundamentals and Applications
As engineering systems become more and more complex, industry has recognized the importance of system and product reliability and places ever increasing emphasis on it during the design phase. Despite its efforts, however, industry continues to lose billions of dollars each year because of unexpected system failures. Therefore, it becomes...
Lonely Planet Dominican Republic & Haiti (Country Travel Guide)
Lonely Planet Dominican Republic & Haiti (Country Travel Guide)

“Much more than beach resorts, the Dominican Republic is one of the Caribbean’s most geographically diverse countries, with an evocative colonial history and warm welcoming people.” – Michael Grosberg, Lonely Planet Writer

Our Promise

You can trust our travel information because
...

UX for Developers: How to Integrate User-Centered Design Principles Into Your Day-to-Day Development Work
UX for Developers: How to Integrate User-Centered Design Principles Into Your Day-to-Day Development Work

Become more mindful of the user when building digital products, and learn how to integrate a user-centered approach into your thinking as a web or app developer. This book shows you how the user experience is the responsibility of everyone involved in creating the product and how to redefine development principles when building...

One Giant Leap: The Impossible Mission That Flew Us to the Moon
One Giant Leap: The Impossible Mission That Flew Us to the Moon
The remarkable story of the trailblazers and the ordinary Americans on the front lines of the epic mission to reach the moon.

President John F. Kennedy astonished the world on May 25, 1961, when he announced to Congress that the United States should land a man on the Moon by 1970. No group was more surprised than the
...
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Compiler Design (International Computer Science Series)
Compiler Design (International Computer Science Series)
Provides a comprehensive, modern approach to the design and construction of compilers. Includes in-depth coverage of compiler generation methods for lexical, syntax and semantic analysis.

About the Author

Reinhard Wilhelm is Professor of Computer Science at the University of the Saarland in
...
Mule ESB Cookbook
Mule ESB Cookbook

If you're familiar with Java, this book will enable you to create a lightweight enterprise service bus using the Mule framework. Starting with the basics, you'll soon have applications on different platforms communicating with each other.

Overview

  • Step-by-step practical recipes to get started with...
PostgreSQL Administration Cookbook, 9.5/9.6 Edition
PostgreSQL Administration Cookbook, 9.5/9.6 Edition

Over 150 recipes to help you administer your PostgreSQL database more efficiently

About This Book

  • Get to grips with the capabilities of PostgreSQL 9.6 to administer your database more efficiently
  • Monitor, tune, secure and protect your database
  • A step-by-step, recipe-based...
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Hands-On Artificial Intelligence with Java for Beginners: Build intelligent apps using machine learning and deep learning with Deeplearning4j
Hands-On Artificial Intelligence with Java for Beginners: Build intelligent apps using machine learning and deep learning with Deeplearning4j

Build, train, and deploy intelligent applications using Java libraries

Key Features

  • Leverage the power of Java libraries to build smart applications
  • Build and train deep learning models for implementing artificial intelligence
  • Learn various algorithms to...
Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

Get up to speed on the latest Group Policy tools, features, and best practices

Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10...

Result Page: 698 697 696 695 694 693 692 691 690 689 688 687 686 685 684 683 682 681 680 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy