Home | Amazing | Today | Tags | Publishers | Years | Search 
Acoustics for Engineers: Troy Lectures
Acoustics for Engineers: Troy Lectures

Blauert's and Xiang's "Acoustics for Engineers" provides the material for an introductory course in engineering acoustics for students with basic knowledge in mathematics. In the second, enlarged edition, the teaching aspects of the book have been substantially improved. Carefully selected examples illustrate the application of...

Handbook of Weighted Automata (Monographs in Theoretical Computer Science. An EATCS Series)
Handbook of Weighted Automata (Monographs in Theoretical Computer Science. An EATCS Series)

Weighted finite automata are classical nondeterministic finite automata in which the transitions carry weights. These weights may model, for example, the cost involved when executing a transition, the resources or time needed for this, or the probability or reliability of its successful execution. Weights can also be added to classical automata...

Under the Radar: The First Woman in Radio Astronomy: Ruby Payne-Scott (Astrophysics and Space Science Library)
Under the Radar: The First Woman in Radio Astronomy: Ruby Payne-Scott (Astrophysics and Space Science Library)

This is the biography of Ruby Payne-Scott (1912 to 1981). As the first female radio astronomer (and one of the first people in the world to consider radio astronomy), she made classic contributions to solar radio physics.

She also played a major role in the design of the Australian government's Council for Scientific and...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Programming Fundamentals: A Modular Structured Approach Using C++
Programming Fundamentals: A Modular Structured Approach Using C++
The approach of this text is to take learners through a progression of materials in order to develop skills of modular, structured programming. The text was written, for the most part, without consideration of a specific programming language. However, in many cases the C++ language is discussed as part of the explanation of the concept. Often...
Mac OS X Snow Leopard Pocket Guide (Pocket ref / guide)
Mac OS X Snow Leopard Pocket Guide (Pocket ref / guide)
Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly.

This book goes right to the
...
PHP for Absolute Beginners
PHP for Absolute Beginners
Get started in web development using PHP. Even if you've never programmed before, author Jason Lengstorf introduces you to PHP by building a PHP-based blogging site while covering all the good coding practices and skills that you'll need when you start your own projects.
  • Create web content with version 5.3 of...
Programming Scala (Animal Guide)
Programming Scala (Animal Guide)
Learn how to be more productive with Scala, a new multi-paradigm language for the Java Virtual Machine (JVM) that integrates features of both object-oriented and functional programming. With this book, you'll discover why Scala is ideal for highly scalable, component-based applications that support concurrency and distribution.

...
Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond
Lean Six Sigma Secrets for the CIO: ITIL, COBIT, and Beyond

Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuble case studies to illustrate how to combine Six Sigma’s rigorous quality principles with Lean methods for uncovering and eliminating waste in your IT processes. Using these methods, the text explains how to take an...

Software Engineering and Development
Software Engineering and Development

Software engineering is one of the most knowledge intensive jobs. Thus, having a good knowledge management (KM) strategy in these organisations is very important. This book examines software processes from a knowledge perspective flow, in order to identify the particular knowledge needs of such processes to then be in a better position for...

Result Page: Previous 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy