Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Any Way You Slice It: The Past, Present, and Future of Rationing
Any Way You Slice It: The Past, Present, and Future of Rationing
Rationing: it’s a word—and idea—that people often loathe and fear. Health care expert Henry Aaron has compared mentioning the possibility of rationing to “shouting an obscenity in church.” Yet societies in fact ration food, water, medical care, and fuel all the time, with those who can pay the most getting the most. As...
Getting Started with Oracle WebLogic Server 12c: Developer's Guide
Getting Started with Oracle WebLogic Server 12c: Developer's Guide

If you’ve dipped a toe into Java EE development and would now like to dive right in, this is the book for you. Introduces the key components of WebLogic Server and all that’s great about Java EE 6.

Overview

  • Create a complete Java EE 6 application leveraging WebLogic features like JMS, SOAP and...
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)

Printed in full color.

To keep doing what you love, you need to maintain your own systems, not just the ones you write code for. Regular exercise and proper nutrition help you learn, remember, concentrate, and be creative--skills critical to doing your job well. Learn how to change your work habits, master exercises
...

The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)

The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...

Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

RaphaelJS: Graphics and Visualization on the Web
RaphaelJS: Graphics and Visualization on the Web

Create beautiful, interactive images on the Web with RaphaëlJS, the JavaScript library that lets you draw Scalable Vector Graphics (SVG) right in the browser. With this concise guide, you’ll quickly learn how to paint the screen with shapes and colors that you can turn into lively, animated graphics and visualizations.

...
Reliability Engineering: Theory and Practice
Reliability Engineering: Theory and Practice

This book shows how to build in, evaluate, and demonstrate reliability and availability of components, equipment, systems. It presents the state-of-the-art of reliability engineering, both in theory and practice, and is based on the author's more than 30 years experience in this field, half in industry and half as Professor of Reliability...

Apache Kafka
Apache Kafka

Set up Apache Kafka clusters and develop custom message producers and consumers using practical, hands-on examples

Overview

  • Write custom producers and consumers with message partition techniques
  • Integrate Kafka with Apache Hadoop and Storm for use cases such as processing streaming...
Building 3D Models with modo 701
Building 3D Models with modo 701

Learn the art of next generation 3D content creation with step-by-step instructions from a real-world pro

Overview

  • Make a 3D model using your imagination
  • Use tricks of the light to express the mood of your scene
  • Learn how to get photo-real images out of your 3D software
  • ...
Unit and Ubiquitous Internet of Things
Unit and Ubiquitous Internet of Things

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.

Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous
...

Electromagnetic Simulation Using the FDTD Method
Electromagnetic Simulation Using the FDTD Method

A straightforward, easy-to-read introduction to the finite-difference time-domain (FDTD) method

Finite-difference time-domain (FDTD) is one of the primary computational electrodynamics modeling techniques available. Since it is a time-domain method, FDTD solutions can cover a wide frequency range with a single simulation run...

Common Sense: Get It, Use It, and Teach It in the Workplace
Common Sense: Get It, Use It, and Teach It in the Workplace

“He may have an MBA, but he’s got no common sense.” Assessments like that by a boss can stop a career dead in its tracks. Unfortunately, many believe that common sense is a trait you are either born with or you are not. This book dispels that myth. Through the pages of Common Sense: Get It, Use It, and Teach It in...

Result Page: Previous 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy