Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
The Data Science Design Manual (Texts in Computer Science)
The Data Science Design Manual (Texts in Computer Science)

This engaging and clearly written textbook/reference provides a must-have introduction to the rapidly emerging interdisciplinary field of data science. It focuses on the principles fundamental to becoming a good data scientist and the key skills needed to build systems for collecting, analyzing, and interpreting data.

The...

Joe Celko's Data and Databases: Concepts in Practice (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's Data and Databases: Concepts in Practice (The Morgan Kaufmann Series in Data Management Systems)

Do you need an introductory book on data and databases? If the book is by Joe Celko, the answer is yes. Data and Databases: Concepts in Practice is the first introduction to relational database technology written especially for practicing IT professionals. If you work mostly outside the database world, this book will ground...

Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Surviving the War for Talent in Asia: How Innovation Can Help
Surviving the War for Talent in Asia: How Innovation Can Help

Find and Keep the Outstanding Leaders You Need to Win in Asia!

  • Specific solutions for recruiting and retaining great people in North Asia, South Asia, Australia, and New Zealand
  • Seven new case studies, plus...
Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems)
The First book that teaches what SQL programmers need in order to successfully make the transition from transactional systems (OLTP) into the world of OLAP.

Before SQL programmers could begin working with OLTP (On-Line Transaction Processing) systems, they had to unlearn procedural, record-oriented programming before moving
...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
The Engines of Our Ingenuity: An Engineer Looks at Technology and Culture
The Engines of Our Ingenuity: An Engineer Looks at Technology and Culture
A million people hear John H. Lienhard's radio program "The Engines of Our Ingenuity." In this fascinating book, Lienhard has gathered together his reflections on the nature of technology, culture, human inventiveness, and the history of engineering. The book brims with insightful observations, offering an intriguing glimpse into...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set
The Encyclopedia of the Cold War: A Political, Social, and Military History, 5 Volume Set

A comprehensive five-volume reference on the defining conflict of the second half of the 20th century, covering all aspects of the Cold War as it influenced events around the world.

• 1,299 entries covering all facets of the Cold War from its origins to its aftermath, including all political, diplomatic, military,...

Technology: A World History (New Oxford World History)
Technology: A World History (New Oxford World History)
Today technology has created a world of dazzling progress, growing disparities of wealth and poverty, and looming threats to the environment. Technology: A World History offers an illuminating backdrop to our present moment--a brilliant history of invention around the globe. Historian Daniel R. Headrick ranges from the Stone Age and the beginnings...
Result Page: 33 32 31 30 29 28 27 26 25 24 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy