Superstition | Rooney Mara | Punjabi Movies
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Project Managers at Work
Project Managers at Work

Read 25 in-depth, candid interviews with notable project managers. Discover how project managers work, what they do, how they adapt and make decisions, how they inspire and motivate others, what career lessons and advice they can share, and how they landed their current jobs either as project managers or in more senior positions thanks to...

Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
Uncertainty and Information: Foundations of Generalized Information Theory
Uncertainty and Information: Foundations of Generalized Information Theory
Deal with information and uncertainty properly and efficiently using tools emerging from generalized information theory

Uncertainty and Information: Foundations of Generalized Information Theory contains comprehensive and up-to-date coverage of results that have emerged from a research program begun by the author in the early 1990s under the...

Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
Over the past few years I’ve been exposed to many different IT environments as part of a wide range of SOA initiatives for clients in both private and public sectors. While doing some work on a project for a client in the defense industry, I had an opportunity to learn more about not just their technical landscape, but also the various...
Reflectarray Antennas
Reflectarray Antennas
Describes the configuration and principles of a reflectarray antenna, its advantages over other antennas, the history of its development, analysis techniques, practical design procedures, bandwidth issues and wideband techniques, as well as applications and recent developments. Both authors are well respected practitioners who have build these...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Real-Time Systems Design and Analysis
Real-Time Systems Design and Analysis
This book is an introduction to real-time systems. It is intended not as a cookbook,
but, rather, as a stimulus for thinking about hardware and software in a different
way. It is necessarily broader than deep. It is a survey book, designed to heighten
the reader’s awareness of real-time issues.

This book is the
...
Teach Yourself Algebra for Electronic Circuits
Teach Yourself Algebra for Electronic Circuits

The way to go for problem-solving skills and applications, TEACH YOURSELF ALGEBRA FOR ELECTRIC CIRCUITS is the self-tutoring guide that's just right for electronics.

* Math that goes beyond elementary algebra, without the burden of heavy-duty calculus you don't need
* All the tools for solving any problem in a single place--no
...

Large-Scale Parallel Data Mining (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Large-Scale Parallel Data Mining (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

With the unprecedented rate at which data is being collected today in almost all elds of human endeavor, there is an emerging economic and scienti c need to extract useful information from it. For example, many companies already have data-warehouses in the terabyte range (e.g., FedEx, Walmart). The World Wide Web has an estimated 800...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy