Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
Wireless sensor networks will revolutionise applications such as environmental monitoring, home automation, and logistics.

Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the most important issues and questions that have to be addressed in a wireless sensor network....

Oracle Data Warehousing and Business Intelligence Solutions
Oracle Data Warehousing and Business Intelligence Solutions
Up-to-date, comprehensive coverage of the Oracle database and business intelligence tools

Written by a team of Oracle insiders, this authoritative book provides you with the most current coverage of the Oracle data warehousing platform as well as the full suite of business intelligence tools. You'll learn how to...

Robust Statistics: Theory and Methods (Probability and Statistics)
Robust Statistics: Theory and Methods (Probability and Statistics)
Classical statistical techniques fail to cope well with deviations from a standard distribution. Robust statistical methods take into account these deviations while estimating the parameters of parametric models, thus increasing the accuracy of the inference. Research into robust methods is flourishing, with new methods being developed and...
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)
Optimal Portfolio Modeling, CD-ROM includes Models Using Excel and R: Models to Maximize Returns and Control Risk in Excel and R (Wiley Trading)

it takes more than just precise timing and picking the right stocks to achieve exceptional results in today's markets. In order to capture consistent success, you need to strike the right balance between position sizing and risk management.

Nobody understands this better than author Philip McDonnell, and with Optimal Portfolio Modeling,...

Marketing to the Social Web: How Digital Customer Communities Build Your Business
Marketing to the Social Web: How Digital Customer Communities Build Your Business

An updated and expanded Second Edition of the popular guide to social media for the business community

Marketers must look to the Web for new ways of finding customers and communicating with them, rather than at them. From Facebook and YouTube to blogs and Twitter-ing, social media on the Internet is the most promising new way to...

The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one...
Chart Your Way To Profits: The Online Trader's Guide to Technical Analysis (Wiley Trading)
Chart Your Way To Profits: The Online Trader's Guide to Technical Analysis (Wiley Trading)
One of my favorite photographs was taken by my wife on our honeymoon. We were on the second leg of our trip, the first of which was in Dubrovnik, Croatia (part of the former Yugoslavia), and the second in central Italy. The photo shows me in bed, apparently asleep. The title of the book I am holding across my chest is clearly legible: Technical...
Buffett Beyond Value: Why Warren Buffett Looks to Growth and Management When Investing
Buffett Beyond Value: Why Warren Buffett Looks to Growth and Management When Investing

A detailed look at how Warren Buffett really invests

In this engaging new book, author Prem Jain extracts Warren Buffett's wisdom from his writings, Berkshire Hathaway financial statements, and his letters to shareholders and partners in his partnership firms-thousands of pages written over the last fifty years. Jain uncovers...

Semantic Computing
Semantic Computing

Presents the state of the technology and points to future directions for semantic computing

Semantic computing, a rapidly evolving interdisciplinary field, seeks to structure, design, and manipulate computer content to better satisfy the needs and intentions of users and create a more meaningful user experience. This...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Engineering Design via Surrogate Modelling: A Practical Guide
Engineering Design via Surrogate Modelling: A Practical Guide
Think of a well-known public personality whom you could easily identify from a photograph. Consider now whether you would still recognize them if most of the photograph was obscured, except for the corner of an eye, a small part of their chin and, perhaps, a half of their mouth. This is a game often played on television quiz shows...
Result Page: 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy