|
|
|
|
Breakthrough IT Change Management: How to Get Enduring Change Results
Note the wide range of the items listed. All of these and many others have the goal of change and improvement in common. Human beings have been concerned about change since the written word. Some societies were afraid of change while others have embraced it. The above methods were created to address change.
This is a *different*... | | Basic Ship Theory Volume 1, Fifth Edition
Rawson and Tupper's Basic Ship Theory, first published in 1968, is widely known as the standard introductory text for naval architecture students, as well as being a useful reference for the more experienced designer.
The fifth edition continues to provide a balance between theory and practice. Volume 1 discusses ship geometry and... | | Smithells Metals Reference Book, Eighth Edition
Smithells is the only single volume work which provides data on all key apsects of metallic materials.
Smithells has been in continuous publication for over 50 years. This 8th Edition represents a major revision.
Four new chapters have been added for this edition. these focus on;
* Non conventional... |
|
Matlab: A Practical Introduction to Programming and Problem Solving
Assuming no knowledge of programming, this book presents both programming concepts and MATLAB's built-in functions, providing a perfect platform for exploiting MATLAB's extensive capabilities for tackling engineering problems. It starts with programming concepts such as variables, assignments, input/output, and selection statements,... | | Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step... | | Digital Video Surveillance and Security
Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position, areas of coverage, hardware and software to select in order to maximize... |
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |