Home | Amazing | Today | Tags | Publishers | Years | Search 
The Jibbali (Shah Ri) Language of Oman: Grammar and Texts (Studies in Semitic Languages and Linguistics)
The Jibbali (Shah Ri) Language of Oman: Grammar and Texts (Studies in Semitic Languages and Linguistics)

This book contains a detailed grammatical description of Jibbali (or Shahri), an unwritten Semitic language spoken in the Dhofar region of Oman, along with seventy texts. This is the first ever comprehensive grammar of Jibbali, and the first collection of texts published in over a hundred years. Topics in phonology, all aspects of morphology,...

Methods in Neuroethological Research
Methods in Neuroethological Research

The rapid progress of neuroscience in the last decade can be largely attributed to significant advances in neuroethology, a branch of science that seeks to understand the neural basis of natural animal behavior. Novel approaches including molecular biological techniques, optical recording methods, functional anatomy, and informatics have...

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Modeling Trust Context in Networks (SpringerBriefs in Computer Science)
Modeling Trust Context in Networks (SpringerBriefs in Computer Science)

We make complex decisions every day, requiring trust in many different entities for different reasons. These decisions are not made by combining many isolated trust evaluations. Many interlocking factors play a role, each dynamically impacting the others.  In this brief, "trust context" is defined as the system level...

Managing the Matrix: The Secret to Surviving and Thriving in Your Organization
Managing the Matrix: The Secret to Surviving and Thriving in Your Organization

A comprehensive guide to excelling in a complex matrix organization

Debra was not in a good mood as she entered Johann’s office for their third meeting. One of her colleagues had just been promoted and, although the guy who got it was good, she didn’t think he was any better than her. Well, except at one...

Apache Solr Essentials
Apache Solr Essentials

Leverage the power of Apache Solr to create efficient search applications

About This Book

  • Learn the Apache Solr conceptual framework for robust search application creation.
  • Customize your search applications to meet your project specifications.
  • A fast paced guide that...
The Robotics Divide: A New Frontier in the 21st Century?
The Robotics Divide: A New Frontier in the 21st Century?

Societies survive in their environment and compete with each other depending on the technology they develop. Economic, military and political power are directly related to the available technology, while access to technology is key to the well-being of our societies at the individual, community and national level.

The Robotics...

Learning Three.js: The JavaScript 3D Library for WebGL - Second Edition
Learning Three.js: The JavaScript 3D Library for WebGL - Second Edition

Create stunning 3D graphics in your browser using the Three.js JavaScript library

About This Book

  • Enhance your 3D graphics with light sources, shadows, advanced materials, and textures
  • Load models from external sources, and visualize and animate them directly from JavaScript
  • ...
Security and Privacy in Biometrics
Security and Privacy in Biometrics

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...

Java EE 7 Developer Handbook
Java EE 7 Developer Handbook

Update your knowledge of the Enterprise Java platform through this user-friendly tutorial that's designed around real-life examples. The pragmatic approach means you'll be up to speed almost effortlessly. For intermediate users upwards.

Overview

  • Learn about local and remote service endpoints,...
Supplementary Cementing Materials in Concrete
Supplementary Cementing Materials in Concrete

Supplementary cementing materials (SCMs), such as fly ash, slag, silica fume, and natural pozzolans, make a significant difference to the properties of concrete but are rarely understood in any detail. SCMs can influence the mechanical properties of concrete and improve its durability in aggressive environments. Supplementary Cementing...

Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Result Page: Previous 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy