Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Best Practices in Lean Six Sigma Process Improvement: A Deeper Look
Best Practices in Lean Six Sigma Process Improvement: A Deeper Look

Best Practices in Lean Six Sigma Process Improvement reveals how to refocus lean/six sigma processes on what author Richard Schonberger—world-renowned process improvement pioneer—calls "the Golden Goals": better quality, quicker response, greater flexibility, and higher value. This manual shows you how it can be...

Cognitive Therapy in Groups: Guidelines and Resources for Practice
Cognitive Therapy in Groups: Guidelines and Resources for Practice

The second edition of Cognitive Therapy in Groups by Michael Free has been completely rewritten as a 25-session, structured programme of cognitive therapy in five modules. It is designed in an easy-to-present psycho-educational format that is intended for groups, but can also be used with individuals. It is sufficiently flexible for...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
The Fabulous Fibonacci Numbers
The Fabulous Fibonacci Numbers
"...delightful...accessible to anyone who enjoys or enjoyed high school mathematics. Mathematics teachers from middle school through college will find this book fun to read and useful in the classroom. The authors consider more properties, relationships, and applications of the Fibonacci numbers than most other sources do...I enjoyed reading...
The R Book
The R Book

R is a high-level language and an environment for data analysis and graphics. The design of R was heavily influenced by two existing languages: Becker, Chambers and Wilks’ S and Sussman’s Scheme. The resulting language is very similar in appearance to S, but the underlying implementation and semantics are derived from Scheme. This...

Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science....
Machine Learning for Audio, Image and Video Analysis: Theory and Applications
Machine Learning for Audio, Image and Video Analysis: Theory and Applications
Machine Learning involves several scientific domains including mathematics, computer science, statistics and biology, and is an approach that enables computers to automatically learn from data. Focusing on complex media and how to convert raw data into useful information, this book offers both introductory and advanced material in the combined...
Spatial Audio Processing: MPEG Surround and Other Applications
Spatial Audio Processing: MPEG Surround and Other Applications

This book collects a wealth of information about spatial audio coding into one comprehensible volume. It is a thorough reference to the 3GPP and MPEG Parametric Stereo standards and the MPEG Surround multi-channel audio coding standard. It describes key developments in coding techniques, which is an important factor in the optimization of...

Professional XML (Programmer to Programmer)
Professional XML (Programmer to Programmer)

From document type definitions and XQuery to Web services and form development, this book takes you through all of the XML capabilities that companies want to implement today. It not only covers the basics of XML and the XML specification, but also shows you the XML-based applications that are driving the tech industry forward, such as blogging...

Puzzles for Programmers and Pros
Puzzles for Programmers and Pros

Solving puzzles demands a mindset that starts with a vulnerable openness followed by a rigorous drive to find a solution. Whether you're preparing for a programming job interview or just like a challenge, this book takes you on a tour of problem-solving techniques so you can dramatically improve your skills. You'll learn how to conquer simple...

Complete MBA For Dummies (Business & Personal Finance)
Complete MBA For Dummies (Business & Personal Finance)
"with this friendly guide, everyone can sample the benefits of an MBA education in a fraction of the time and at much less cost" (Business a.m., 5 November 2002)

Want to get an MBA? The Complete MBA For Dummies, 2nd Edition, is the practical, plain-English guide that covers all the basics of a
...
Introduction to Bayesian Scientific Computing: Ten Lectures on Subjective Computing
Introduction to Bayesian Scientific Computing: Ten Lectures on Subjective Computing
The book of nature, according to Galilei, is written in the language of mathematics. The nature of mathematics is being exact, and its exactness is underlined by the formalism used by mathematicians to write it. This formalism, characterized by theorems and proofs, and syncopated with occasional lemmas, remarks and corollaries, is so deeply...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy