Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Tipping Point: How Little Things Can Make a Big Difference
The Tipping Point: How Little Things Can Make a Big Difference
The Tipping Point is that magical moment when an idea, trend, or social behaviour crosses a threshhold, tips, and spreads like wildfire. Just as a sick individual in a crowded store can start can epidemic of the flu, so too can a small but precisely targeted push cause a fashion trend or the popularity of a new restaurant to take off overnightor...
The Encyclopedia of Trading Strategies
The Encyclopedia of Trading Strategies

The Encyclopedia of Trading Strategies is for traders who want to take the next step to consistently profitable trading. The authors--themselves seasoned veterans of the futures trading arena--pinpoint the trading methods and strategies that have been shown to produce market-beating returns. Their rigorous and systematic backtesting of each...

Forensic Engineering Investigation
Forensic Engineering Investigation
Forensic engineering is the application of engineering principles, knowledge,
skills, and methodologies to answer questions of fact that may have legal
ramifications. Forensic engineers typically are called upon to analyze car
accidents, building collapses, fires, explosions, industrial accidents, and various
calamities
...
Troubleshooting Windows 2000 TCP/IP
Troubleshooting Windows 2000 TCP/IP
W2Knews Electronic Newsletter, March 13, 2000
...guides for planning, testing and deploying a W2K TCP/IP network. A great troubleshooting help when you have connectivity problems.

TCP/IP is a set of protocols developed to allow computers to share resources across a network.
...
Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference
As Microsoft Windows becomes increasingly network-centric, its TCP/IP services get increasingly important. Microsoft Windows 2000 TCP/IP Protocols and Services Technical Reference documents the protocols as they relate to Windows 2000. Odds are high that you'll find the networking solutions you need in this book. Even though it's not...
Server-Based Java Programming
Server-Based Java Programming
Demonstrates how to take full advantage of Java's power on servers by using current technologies such as Java Servlets, Java Web server, and JNDI.

In September1999, Sun Microsystems Inc. released the first draft of the Java2 Enterprise Edition
specification, and Java changed forever.

Since 1997, developers and vendors
...
Inside Cisco IOS Software Architecture (CCIE Professional Development)
Inside Cisco IOS Software Architecture (CCIE Professional Development)
An essential guide to understanding the Cisco IOS architecture

In-depth coverage of Cisco's IOS Software architecture provides crucial information to:

  • Prevent network problems and optimize performance through more efficient design and configuration
  • Isolate and resolve network problems more quickly and...
Minimal Graphics: The Powerful New Look of Graphic Design
Minimal Graphics: The Powerful New Look of Graphic Design
Here is a striking collection of minimal graphic designs that get the message across. The best design work today is minimal. Crashing type, unreadable text, words used as "texture" and in-your-face images are on the way out. The visual overload of the last decade is being replaced by simple, seamless design with a clean approach. ...
The Communications Facility Design Handbook (Electronics Handbook Series)
The Communications Facility Design Handbook (Electronics Handbook Series)
The responsibilities of the system engineer are many and varied, especially as they relate to facility design and construction. Successful execution of these responsibilities requires an understanding of the underlying technologies, the applicable quality standards, and the proper methods for achieving them. The Communications Facility Design...
Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

ADO Examples and Best Practices
ADO Examples and Best Practices
  • Based on the author's experience working with front-line date access developers and development teams at Microsoft and throughout the industry worldwide
  • Helps you, the developer, choose and implement the best data access technologies for your project
  • Suitable for newer and for more experienced ADO...
Design and Analysis of Experiments (Springer Texts in Statistics)
Design and Analysis of Experiments (Springer Texts in Statistics)
The design and analysis of experiments is an essential part of investigation and discovery in science, of process and product improvement in manufacturing, and of comparison of competing protocols or treatments in the applied sciences. This book offers a step by step guide to the experimental planning process and the ensuing analysis of...
unlimited object storage image
Result Page: Previous 62 63 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy