Kirjojen hintavertailu. Mukana 12 334 892 kirjaa ja 12 kauppaa.

Kirjailija

Mark Burnett

Kirjat ja teokset yhdessä paikassa: 9 kirjaa, julkaisuja vuosilta 2001-2026, suosituimpien joukossa Geostatistics Notes for Practitioners. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

9 kirjaa

Kirjojen julkaisuhaarukka 2001-2026.

Geostatistics Notes for Practitioners

Geostatistics Notes for Practitioners

Glen Nwaila; Leon Tolmay; Mark Burnett

TAYLOR FRANCIS LTD
2026
nidottu
This book provides a practical perspective of all the processes involved in estimating mineral resources and reserves, including mine-to-mill reconciliation. It provides an integrated step-by-step explanation of processes for performing each step, including insight from academic and industry practitioners. Each chapter details a specific aspect of the estimation processes in a practical manner. It contains examples and case studies to illustrate the practical application of geostatistics in mineral resource estimation, mineral reserve conversion, and reconciliation. Features Provides a step-by-step guide with over 10,000 lines of Python code for hands-on demonstration, from start to finish, for both linear and non-linear geostatistical methods. Explains practical geostatistics processes and functionality. Simplifies explanation of mathematical /statistical concepts and application. Discusses generalised examples to aid the process steps. Reviews processes involved in the mineral resources’ estimation and ore reserve conversion. This book is intended for third-year and postgraduate students in Mineral Resources Management, Geology, Spatial Statistics, and Mining Engineering, as well as practising professionals.
Geostatistics Notes for Practitioners

Geostatistics Notes for Practitioners

Glen Nwaila; Leon Tolmay; Mark Burnett

TAYLOR FRANCIS LTD
2024
sidottu
This book provides a practical perspective of all the processes involved in estimating mineral resources and reserves, including mine-to-mill reconciliation. It provides an integrated step-by-step explanation of processes for performing each step, including insight from academic and industry practitioners. Each chapter details a specific aspect of the estimation processes in a practical manner. It contains examples and case studies to illustrate the practical application of geostatistics in mineral resource estimation, mineral reserve conversion, and reconciliation. FeaturesProvides a step-by-step guide with over 10,000 lines of Python code for hands-on demonstration, from start to finish, for both linear and non-linear geostatistical methods.Explains practical geostatistics processes and functionality.Simplifies explanation of mathematical /statistical concepts and application.Discusses generalised examples to aid the process steps.Reviews processes involved in the mineral resources’ estimation and ore reserve conversion.This book is intended for third-year and postgraduate students in Mineral Resources Management, Geology, Spatial Statistics, and Mining Engineering, as well as practising professionals.
H3 Leadership

H3 Leadership

Brad Lomenick; Mark Burnett

HarperCollins Leadership
2016
nidottu
The patterns we cultivate shape the person we each become.Be Humble. Stay Hungry. Always Hustle. These powerful words describe the leader who is willing to work hard, get it done, and make sure it’s not about him or her; the leader who knows that influence is about developing the right habits for success.Brad Lomenick, former president of Catalyst, shares his hard-earned insights from more than two decades of work alongside thought-leaders such as Jim Collins and Malcom Gladwell, Fortune 500 CEOs and start-up entrepreneurs.Operating within the framework of three core character qualities – humble, hungry, hustle – Lomenick identifies 20 essential leadership habits that help readers embody those qualities, including:Staying open and sharing the real you with othersOwning your convictions and sticking to your principlesDeveloping an appetite for what’s nextPursuing innovation by staying current, creative, and engagedDemanding excellence by setting standards that scare youFostering collaboration with colleagues and competitorsOffering practical steps to embrace these habits, H3 Leadership provides a simple but effective guide on how to lead well in whatever capacity the reader may be in.
A Story of God and All of Us: Companion to the Hit TV Miniseries The Bible
Scripture's greatest stories and most compelling characters come to life in this sweeping new novel by Roma Downey and Mark Burnett. Beginning with the creation of man and ending with the revelation of a new world, readers will revel in this epic saga of warriors, rebels, poets, and kings, all called upon by God to reveal His enduring love for mankind. Ultimately, God's plan is fulfilled in the story of Jesus the Messiah, whose life, death and resurrection brings salvation to one and all. A STORY OF GOD AND ALL OF US is a companion to The Bible, the epic ten-hour mini-series produced by the authors and televised around the world.
Una Historia de Dios Y de Todos Nosotros

Una Historia de Dios Y de Todos Nosotros

Roma Downey; Mark Burnett

Little, Brown Company
2013
pokkari
THE STORY OF GOD AND US is a sweeping narrative that dramatizes some of the most important events and characters in the Bible. The book provides enriching detail, dialog and descriptions about the Bible's most fascinating stories. All are historically and theologically accurate. A ten-hour miniseries on the History Channel will be based on the story, and the script has been reviewed by a number of Christian church leaders and seminarians for authenticity. The book will be released one month prior to the debut of the television series. Many prominent biblical characters will be dramatized in the story: Moses, David, Daniel, John the Baptist and of course, Jesus. The book will reveal the prophetic significance of the empires that occupied Israel: (Egyptians, Babylonians, Persians and Romans) and how these figured into biblical prophecy, especially concerning the Messiah.
Midas Touch

Midas Touch

Donald J. Trump; Robert T. Kiyosaki; Mark Burnett

Plata Publishing
2011
sidottu
In Midas Touch, Donald Trump and Robert Kiyosaki ask the question: What's an entrepreneur's most important job? The answer: creating high-quality, stable jobs. And in today's marketplace, "jobs" are in high demand -- and so are the skills and the innovation and vision of entrepreneurs. In a world of high unemployment and an economy that needs new jobs to recover, who isn't hungry for a solution, something that will speed economic recovery? Many look to the government, but it's becoming more and more obvious that governments can't create real jobs. Trump and Kiyosaki believe that only one group can bring our world back to prosperity: Entrepreneurs. And, especially, entrepreneurs with the Midas Touch. This book is for people who are thinking of starting a business or who already have one and want to grow it. Midas Touch teaches how to leverage five key components that can impact success in business: Strength of character F.O.C.U.S. Brand Relationships Little things...that really count
Perfect Password

Perfect Password

Mark Burnett

Syngress Media,U.S.
2006
nidottu
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
Microsoft Log Parser Toolkit

Microsoft Log Parser Toolkit

Gabriele Giuseppini; Mark Burnett

Syngress Media,U.S.
2005
nidottu
Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
Maximum Windows 2000 Security

Maximum Windows 2000 Security

Anonymous; Mark Burnett; L. Locher; Chris Doyle; Chris Amaris; Rand Morimoto

Sams Publishing
2001
nidottu
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security. Topics include: Physical & File System Security, Password Security, Malicious Code, Windows 2000 Network Security Architecture and Professional Protocols, Web Server Security, Denial of Service Attacks, Intrusion Detection, Hacking Secure Code in Windows 2000.