Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

Essentials of Mathematical Methods in Science and Engineering
Essentials of Mathematical Methods in Science and Engineering

A comprehensive introduction to the multidisciplinary applications of mathematical methods, revised and updated

The second edition of Essentials of Mathematical Methods in Science and Engineering offers an introduction to the key mathematical concepts of advanced calculus, differential equations, complex...

Applied Statistics: Theory and Problem Solutions with R
Applied Statistics: Theory and Problem Solutions with R

Instructs readers on how to use methods of statistics and experimental design with R software 

Applied statistics covers both the theory and the application of modern statistical and mathematical modelling techniques to applied problems in industry, public services, commerce, and research. It proceeds...

Future Propulsion Systems and Energy Sources in Sustainable Aviation (Aerospace Series)
Future Propulsion Systems and Energy Sources in Sustainable Aviation (Aerospace Series)

A comprehensive review of the science and engineering behind future propulsion systems and energy sources in sustainable aviation

Future Propulsion Systems and Energy Sources in Sustainable Aviation is a comprehensive reference that offers a review of the science and engineering principles that underpin the...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Emerging Epidemics: Management and Control
Emerging Epidemics: Management and Control

A global perspective on the management and prevention of emerging and re-emerging diseases

Emerging infectious diseases are newly identified or otherwise previously unknown infections that cause public health challenges. Re-emerging infectious diseases are due to both the reappearance of and an increase in the number of...

Computer Modeling in Bioengineering: Theoretical Background, Examples and Software
Computer Modeling in Bioengineering: Theoretical Background, Examples and Software

Bioengineering is a broad-based engineering discipline that applies engineering principles and design to challenges in human health and medicine, dealing with bio-molecular and molecular processes, product design, sustainability and analysis of biological systems. Applications that benefit from bioengineering include medical devices, diagnostic...

Advances in Questionnaire Design, Development, Evaluation and Testing
Advances in Questionnaire Design, Development, Evaluation and Testing

A new and updated definitive resource for survey questionnaire testing and evaluation

Building on the success of the first Questionnaire Development, Evaluation, and Testing (QDET) conference in 2002, this book brings together leading papers from the Second International Conference on Questionnaire Design,...

Assembly Language Programming: ARM Cortex-M3
Assembly Language Programming: ARM Cortex-M3

ARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly optimized piece of software (as is often the case in the world of embedded systems) it...

User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Result Page: 311 310 309 308 307 306 305 304 303 302 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy