Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using Hoshin Kanri to Improve the Value Stream
Using Hoshin Kanri to Improve the Value Stream
Every industrial engineer should purchase Using Hoshin Kanri to Improve the Value Stream. It provides the key to using the Hoshin Kanri framework and integrating it with the foundations of industrial engineering.

— Marjorie Koch, President, Lean Division, Institute of Industrial Engineers

Cudneys book...

MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
The Art of Agent-Oriented Modeling (Intelligent Robotics and Autonomous Agents)
Today, when computing is pervasive and deployed over a range of devices by a multiplicity of users, we need to develop computer software to interact with both the ever-increasing complexity of the technical world and the growing fluidity of social organizations. The Art of Agent-Oriented Modeling presents a new conceptual model for...
Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

Advances in Intelligent Web Mastering - 2: Proceedings of the 6th Atlantic Web Intelligence Conference
Advances in Intelligent Web Mastering - 2: Proceedings of the 6th Atlantic Web Intelligence Conference

Welcome to the 6th Atlantic Web Intelligence Conference (AWIC 2009), to be held during September 9-11, 2009 in Prague, Czech Republic. The conference will be held at the Faculty of Mathematics and Physics of the Charles University, Prague. This building has a convenient location in the historical city center, in the area called Lesser Town close...

Advanced Functional Programming: 6th International School, AFP 2008, Heijen, The Netherlands, May 19-24, 2008, Revised Lectures
Advanced Functional Programming: 6th International School, AFP 2008, Heijen, The Netherlands, May 19-24, 2008, Revised Lectures

This tutorial book presents seven carefully revised lectures given at the 6th International School on Functional Programming, AFP 2008, in Heijen, The Netherlands in May 2008.

The book presents the following seven, carefully cross-reviewed chapters, written by leading authorities in the field: Self-adjusting: Computation with Delta ML,...

The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

CCNA Security Course Booklet, Version 1.0
CCNA Security Course Booklet, Version 1.0

The Cisco CCNA Security curriculum provides a comprehensive overview of contemporary network security, helping Cisco Networking Academy students systematically prepare for the latest CCNA Security exam. While extensive online study resources are available, many students and instructors have requested a low-cost printed resource that can be...

Why Kids Kill: Inside the Minds of School Shooters
Why Kids Kill: Inside the Minds of School Shooters

Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent...

Applying Design for Six Sigma to Software and Hardware Systems
Applying Design for Six Sigma to Software and Hardware Systems

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two
...

SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

Result Page: Previous 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy