Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning to Lead: Using Leadership Skills to Motivate Students
Learning to Lead: Using Leadership Skills to Motivate Students
Graham Tyrer demonstrates that students have positive leadership abilities, and they can be taught how to use these abilities and then to teach others. ...
Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Entity Framework 4.0 Recipes: A Problem-Solution Approach
Entity Framework 4.0 Recipes: A Problem-Solution Approach

Anyone who has been developing on the Microsoft platform for the last several years knows the drill: every few years, there’s a new database access technology. There was ODBC; then DAO and RDO; OLEDB, ADO, and ADO.NET; LINQ to SQL; and now Entity Framework! In many ways, this progression of technologies has been confusing, but in other...

Innovate the Future: A Radical New Approach to IT Innovation
Innovate the Future: A Radical New Approach to IT Innovation

A Proven, Step-by-Step Method for Consistently Creating Revolutionary Products, Services, and Processes

 

When it comes to entering, creating, or dominating markets, disruptive innovation is the most powerful tool you have. Unfortunately, most companies find...

Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content
Audience, Relevance, and Search: Targeting Web Audiences with Relevant Content

How much more effective would companies be if all the content they created for the Web reached its specific target audience? In this book, three pioneering IBM content and search experts show how to get closer to this goal than ever before. Readers will discover how to write highly relevant content containing the keywords and long-tail...

Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7
Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7

Microsoft Windows 7 Administrator's Reference gives you a complete overview of all the important day-to-day duties for which administrators are responsible. From a complete overview of upgrading and implementing to a detailed view of security in Windows 7, this book will keep you on track. Coverage includes: installing and...

Tabletops - Horizontal Interactive Displays (Human-Computer Interaction Series)
Tabletops - Horizontal Interactive Displays (Human-Computer Interaction Series)

This book is an attempt to bring together current research in the domain of interactive horizontal displays. The book integrates and summarises findings from the most important international tabletop research teams. It provides a state-of-the-art overview and allows for the discussion of emerging and future directions in research and...

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

The intention of this book is to provide a thorough reference for those considering a migration into the virtualized world. The majority of our target readers will likely be seasoned system administrators and engineers who grew up in and still manage primarily a hardware-based server environment containing a large assortment of both...

Machine Learning Approaches to Bioinformatics (Science, Engineering, and Biology Informatics)
Machine Learning Approaches to Bioinformatics (Science, Engineering, and Biology Informatics)

This book covers a wide range of subjects in applying machine learning approaches for bioinformatics projects. The book succeeds on two key unique features. First, it introduces the most widely used machine learning approaches in bioinformatics and discusses, with evaluations from real case studies, how they are used in individual...

HACCP: A Toolkit for Implementation
HACCP: A Toolkit for Implementation
Hazard Analysis and Critical Control Point (HACCP) is a systematic method to identify, evaluate and control food safety hazards. Since its initial development in the 1960s, HACCP has been increasingly used at every stage of the food chain. In many countries, it is a legal requirement for all food business operators to have some form of hazard...
Exploitation of Linkage Learning in Evolutionary Algorithms (Adaptation, Learning, and Optimization)
Exploitation of Linkage Learning in Evolutionary Algorithms (Adaptation, Learning, and Optimization)

One major branch of enhancing the performance of evolutionary algorithms is the exploitation of linkage learning. This monograph aims to capture the recent progress of linkage learning, by compiling a series of focused technical chapters to keep abreast of the developments and trends in the area of linkage. In evolutionary algorithms, linkage...

Result Page: Previous 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy