Applied Analysis and Differential Equations; Iasi, Romania, 4-9 September 2006 | Cassande | More Details
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
GIS for Web Developers: Adding 'Where' to Your Web Applications
GIS for Web Developers: Adding 'Where' to Your Web Applications

There is a hidden revolution going on: geography is moving from niche to the mainstream. News reports routinely include maps and satellite images. More and more pieces of equipment cell phones, cars, computers now contain Global Positioning System (GPS) receivers. Many of the major database vendors have made geographic data types...

Linear Programming: Foundations and Extensions (International Series in Operations Research & Management Science)
Linear Programming: Foundations and Extensions (International Series in Operations Research & Management Science)
Linear Programming: Foundations and Extensions is an introduction to the field of optimization. The book emphasizes constrained optimization, beginning with a substantial treatment of linear programming, and proceeding to convex analysis, network flows, integer programming, quadratic programming, and convex optimization.

The book is...

Calculus (Stewart's Calculus Series)
Calculus (Stewart's Calculus Series)

Success in your calculus course starts here! James Stewart's CALCULUS texts are world-wide best-sellers for a reason: they are clear, accurate, and filled with relevant, real-world examples. With CALCULUS, Sixth Edition, Stewart conveys not only the utility of calculus to help you develop technical competence, but also gives you an...

Enterprise AJAX: Strategies for Building High Performance Web Applications
Enterprise AJAX: Strategies for Building High Performance Web Applications
If you are like many of the talented developers we meet, you’re interested in AJAX and how you can use it to improve your web applications. You may have even done some preliminary research online, checked out Ajaxian.com, or read a beginner’s book to AJAX development. If not, then you’re like an even larger group of talented...
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
It's not a job. It's THE job, and here's how to get it.

What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?

Here's the crash course in how to...

Automated Data Analysis Using Excel
Automated Data Analysis Using Excel
Because the analysis of copious amounts of data and the preparation of custom reports often take away time from true research, the automation of these processes is paramount to ensure productivity. Exploring the core areas of automation, report generation, data acquisition, and data analysis, Automated Data Analysis Using Excel illustrates how to...
Algorithms on Strings
Algorithms on Strings
'perfect for lectures on 'stringology', for graduate students as a reference on the topic and for appliers in linguistic or molecular biology' Acta Scientiarum Mathematicarum

This text and reference on string processes and pattern matching presents examples related to the automatic processing of natural language, to the
...
A Matrix Handbook for Statisticians (Wiley Series in Probability and Statistics)
A Matrix Handbook for Statisticians (Wiley Series in Probability and Statistics)
A comprehensive, must-have handbook of matrix methods with a unique emphasis on statistical applications

This timely book, A Matrix Handbook for Statisticians, provides a comprehensive, encyclopedic treatment of matrices as they relate to both statistical concepts and methodologies. Written by an experienced authority on matrices and...

Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Evolutionary computing paradigms offer robust and powerful adaptive search mechanisms for system design. This book includes thirteen chapters covering a wide area of topics in evolutionary computing and applications including: Introduction to evolutionary computing in system design; evolutionary neuro-fuzzy systems; evolution of fuzzy controllers;...
Yoga and Multiple Sclerosis: A Journey to Health and Healing
Yoga and Multiple Sclerosis: A Journey to Health and Healing

Yoga for people with multiple sclerosis? Absolutely! Today, people with a wide range of medical problems use yoga successfully. Because of its emphasis on relaxation, breathing, and deliberate movement, it can be especially beneficial for individuals dealing with a neurologic disease like multiple sclerosis.

Yoga and Multiple...

Mathematics and Computation in Imaging Science and Information Processing
Mathematics and Computation in Imaging Science and Information Processing

Rapid advances in communication, sensing and computational power have led to an explosion of data. The usefulness of this resource for human knowledge is determined by its accessibility and portability, which present fresh challenges to existing techniques in terms of transmission, storage, querying, display and numerical manipulation. As a...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy