Home | Amazing | Today | Tags | Publishers | Years | Search 
Moodle 1.9 Testing and Assessment
Moodle 1.9 Testing and Assessment

This book is a practical guide to testing in Moodle. You will initially learn to create different types of questions such as True/False, multiple choice, short answer, and so on. After you have learned how to create questions you will follow a step-by-step process to create complete tests by tweaking various options. Once you have gone...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable surface 3D reconstruction from monocular images is an active area of research in the Computer Vision community. This encompasses recovering both the shape of thin objects that can be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects. Whereas this may seem easy for a human...
Introduction to the Theory of Programming Languages (Undergraduate Topics in Computer Science)
Introduction to the Theory of Programming Languages (Undergraduate Topics in Computer Science)
The ultimate, definitive programming language has not been created yet, far from it. Almost every day a new language is created, and new functionalities are added to existing languages. Improvements in programming languages contribute to making programs more reliable, shorten the development time, and make programs easier to...
Three Dimensional System Integration: IC Stacking Process and Design
Three Dimensional System Integration: IC Stacking Process and Design

Three-dimensional (3D) integrated circuit (IC) stacking is the next big step in electronic system integration. It enables packing more functionality, as well as integration of heterogeneous materials, devices, and signals, in the same space (volume). This results in consumer electronics (e.g., mobile, handheld devices) which can run more...

Tales for Coaching: Using Stories and Metaphors with Individuals and Small Groups
Tales for Coaching: Using Stories and Metaphors with Individuals and Small Groups

More and more people are discovering how to use storytelling to bring about change and reinforce learning.  In this book, Margaret Parkin combines these two approaches into a powerful and effective technique to assist personal change.

Showing how and when to use stories to maximum effect, Parkin...

Moving the Eye Through 2-D Design: A Visual Primer
Moving the Eye Through 2-D Design: A Visual Primer

An overview of the visual arts fundamentals, Moving the Eye Through 2-D Design provides a step-by-step approach to understanding what causes us to look at a painting, photograph, or any two-dimensional media and what is needed to maintain visual interest. This volume introduces a goal-oriented method that applies aspects of line,...

Koha 3 Library Management System
Koha 3 Library Management System

Koha is the first full-featured open source library management system that is widely used for efficiently managing libraries. However, setting up and maintaining Koha is no walk in the park. It is not as straightforward as setting up the other popular LAMP applications.

This practical guide provides all the essential information...

Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

InfoPath with SharePoint 2010 How-To
InfoPath with SharePoint 2010 How-To

This book is designed to cover all of the aspects of InfoPath 2010 within a SharePoint 2010 environment in regards to creating and developing business solutions. It is geared toward both technical and semi-technical professionals and does not require a degree in computer programming to utilize.

The scenario-based
...

Bayesian Artificial Intelligence, Second Edition
Bayesian Artificial Intelligence, Second Edition

Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian...

Result Page: Previous 224 225 226 227 228 229 230 231 232 233 234 235 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy