Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Connecting with Grieving Clients: Supportive Communications for 14 Common Situations
Connecting with Grieving Clients: Supportive Communications for 14 Common Situations

Guiding pet owners through their grief following the loss of a beloved pet is one of the toughest parts of your staff's job. Handled sensitively and compassionately, the situation can strengthen the bond with the client for years to come. The new, second edition of this valuable resource offers specific strategies for dealing with a...

Analysis of Phylogenetics and Evolution with R (Use R!)
Analysis of Phylogenetics and Evolution with R (Use R!)
Phylogenetics is the science of the evolutionary relationships among species. Recently, the term has come to include broader issues such as estimating rates of evolution, dating divergence among species, reconstructing ancestral characters, or quantifying adaptation, all these using phylogenies as frameworks. ...
Automatic Control of Atmospheric and Space Flight Vehicles: Design and Analysis with MATLAB® and Simulink® (Control Engineering)
Automatic Control of Atmospheric and Space Flight Vehicles: Design and Analysis with MATLAB® and Simulink® (Control Engineering)
The main purpose of writing this book is to present a unified approach for automatic control of atmospheric and space flight vehicles. Such an outlook has become more necessary nowthan ever,with the advent of aerospace vehicleswhose singlemission covers operation as aircraft, rocket, and spacecraft at various instants....
Virtual Realities: Dagstuhl Seminar 2008
Virtual Realities: Dagstuhl Seminar 2008

The articles by well-known international experts intend to facilitate more elaborate expositions of the research presented at the seminar, and to collect and document the results of the various discussions, including ideas and open problems that were identified. Correspondingly the book will consist of two parts. Part I will consist of...

OpenLayers 2.10 Beginner's Guide
OpenLayers 2.10 Beginner's Guide

Web mapping is the process of designing, implementing, generating, and delivering maps on the World Wide Web and its products. OpenLayers is a powerful, community driven, open source, pure JavaScript web mapping library. With it, you can easily create your own web map mashup using WMS, Google Maps, and a myriad of other map backends....

How to Do Everything Adobe Acrobat X
How to Do Everything Adobe Acrobat X

Acrobat X Pro is a full-featured application that enables the end user to convert documents into PDF (Portable Document Format) documents. PDF documents can be read by anybody who has the free Adobe Reader installed on his or her computer. Many people who own Acrobat don’t utilize many of the incredible features the application...

HBase: The Definitive Guide
HBase: The Definitive Guide

You may be reading this book for many reasons. It could be because you heard all about Hadoop and what it can do to crunch petabytes of data in a reasonable amount of time. While reading into Hadoop you found that, for random access to the accumulated data, there is something called HBase. Or it was the hype that is prevalent these days...

Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps
Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps

Gamification may be a new term, but the idea of using game-thinking and game mechanics to solve problems and engage audiences isn’t exactly new. The military has been using games and simulations for hundreds (if not thousands) of years, and the U.S. military has been a pioneer in the use of video games across branches. Three...

Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Lessons in IT Transformation: Technology Expert to Business Leader
Lessons in IT Transformation: Technology Expert to Business Leader
Why should I read this book? Be honest—that’s what you are really trying to figure out before you decide to invest the time and money required to read any book. There are thousands of books available on the topic of leadership. Why is this book different, and why should you care? Here are a few answers to your...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Mobile Design for iPhone and iPad
Mobile Design for iPhone and iPad
Web designers know that their industry changes quickly. Continuous adaption and development of skills is necessary in order to always stay up to date. Over the past few years, mobile web usage has increased to a point that web designers can no longer afford to ignore it. As a result, web designers have a growing need to be...
unlimited object storage image
Result Page: Previous 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy