Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Routledge Guidebook to Heidegger's Being and Time (The Routledge Guides to the Great Books)
The Routledge Guidebook to Heidegger's Being and Time (The Routledge Guides to the Great Books)

The Routledge Guidebook to Heidegger’s Being and Time examines the work of one of the most controversial thinkers of the twentieth century. Heidegger’s writings are notoriously difficult, requiring careful reading. This book analyses his first major publication, Being and Time, which to this day remains his most...

Managing Your Outsourced IT Services Provider: How to Unleash the Full Potential of Your Global Workforce
Managing Your Outsourced IT Services Provider: How to Unleash the Full Potential of Your Global Workforce

Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decades of experience managing client relationships for global IT services companies,...

Windows 8.1 Inside Out
Windows 8.1 Inside Out

You're beyond the basics - so dive right in and really put your PC to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows 8.1. Plus, you get access to two and half hours of video training and a companion ebook.

Topics include:

Getting Clojure: Build Your Functional Skills One Idea at a Time
Getting Clojure: Build Your Functional Skills One Idea at a Time

Behind every programming language lies a vision of how programs should be built. The vision behind Clojure is of a radically simple language framework holding together a sophisticated collection of programming features. Learning Clojure involves much more than just learning the mechanics of the language. To really get...

Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003, Proceedings, Part I (Lecture Notes in Computer Science)
Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003, Proceedings, Part I (Lecture Notes in Computer Science)

These proceedings contain the papers presented at the 5th Annual Genetic and Evolutionary Computation Conference (GECCO 2003). The conference was held in Chicago, USA, July 12–16, 2003.

A total of 417 papers were submitted to GECCO 2003. After a rigorous doubleblind reviewing process, 194 papers were accepted for full
...

Expert Twisted: Event-Driven and Asynchronous Programming with Python
Expert Twisted: Event-Driven and Asynchronous Programming with Python
Explore Twisted, the Python-based event-driven networking engine, and review several of its most popular application projects. It is written by community leaders who have contributed to many of the projects covered, and share their hard-won insights and experience.

Expert Twisted starts with an introduction...
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.

Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects
...
.NET Mobile Web Developer's Guide
.NET Mobile Web Developer's Guide
The .NET Mobile Web Developer's Guide provides a solid foundation for developing mobile applications using Microsoft technologies. With a focus on using ASP.NET and the .NET Mobile Internet Toolkit, .NET Mobile Web Developer's Guide will give you the insight to use Microsoft technologies for developing mobile applications. This book will also show...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Answers to your most pressing SOA development questions

How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound...

The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
"No present book comes near this one in the range and depth of treatment of these two extremely important methods—the Lanczos algorithm and the method of conjugate gradients." Chris Paige, School of Computer Science, McGill University.   The Lanczos and conjugate gradient (CG) algorithms are fascinating numerical...
Maran Illustrated Computers Guided Tour
Maran Illustrated Computers Guided Tour
Produced by the award-winning maranGraphics Group, "Maran Illustrated™ Computers – Guided Tour" is a valuable resource for all readers, regardless of experience. "Maran Illustrated™ Computers – Guided Tour" is packed with information useful to readers who are interested in purchasing their first computer...
unlimited object storage image
Result Page: 478 477 476 475 474 473 472 471 470 469 468 467 466 465 464 463 462 461 460 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy