Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer-Aided Control Systems Design: Practical Applications Using MATLAB® and Simulink®
Computer-Aided Control Systems Design: Practical Applications Using MATLAB® and Simulink®

Computer-Aided Control Systems Design: Practical Applications Using MATLAB® and Simulink® supplies a solid foundation in applied control to help you bridge the gap between control theory and its real-world applications. Working from basic principles, the book delves into control systems...

The Fairy Tale World (Routledge Worlds)
The Fairy Tale World (Routledge Worlds)

The Fairy Tale World is a definitive volume on this ever-evolving field. The book draws on recent critical attention, contesting romantic ideas about timeless tales of good and evil, and arguing that fairy tales are culturally astute narratives that reflect the historical and material circumstances of the societies in which...

Assouad Dimension and Fractal Geometry (Cambridge Tracts in Mathematics, Series Number 222)
Assouad Dimension and Fractal Geometry (Cambridge Tracts in Mathematics, Series Number 222)
The Assouad dimension is a notion of dimension in fractal geometry that has been the subject of much interest in recent years. This book, written by a world expert on the topic, is the first thorough account of the Assouad dimension and its many variants and applications in fractal geometry and beyond. It places the theory of the Assouad...
Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example
Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example

Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example is a practical, hands-on guide to putting use case methods to work in real-world situations. This workbook is a companion to Use Case Driven Object Modeling with UML. It bridges the gap between the theory presented in the main book...

php architect's Guide to PHP Security|
php architect's Guide to PHP Security|
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.

Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on...

Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators

The First Practical Guide to the Use of Photoshop in Forensics Investigations

This timely book is the first to take the forensic use of digital imaging out of the classroom and into the real world for law enforcement, legal, and other forensics professionals. How do you show the exact position or...

People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
People-Focused Knowledge Management: How Effective Decision Making Leads to Corporate Success
The business environment has changed. Sharper competition requires organizations to exhibit greater effectiveness in their operations and services and faster creation of new products and servicesall hallmarks of the knowledge economy. Up until now, most of the knowledge management literature has focused on technology, systems, or culture. This book...
Combustion Processes in Propulsion: Control, Noise, and Pulse Detonation
Combustion Processes in Propulsion: Control, Noise, and Pulse Detonation
"This collection represents the current state-of-the-art in combustion research for air-breathing chemical propulsion. Nearly an equal mix of computational and experimental results are presented from the major players in Pulse Detonation Engines research, providing the reader with a thorough overview of the contemporary technical issues...
Advances in Information Processing and Protection
Advances in Information Processing and Protection
This book contains a selection of the best papers given at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas:

The Artificial Intelligence section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity...

The Use of Forensic Anthropology, Second Edition
The Use of Forensic Anthropology, Second Edition
This book is written for medical examiners, coroners, and other law enforcement officers who are responsible for conducting death investigations. Forensic analysis has become and will continue to be a complex and highly specialized field of study. No longer can the lone investigator take on the responsibilities of doing all the work of recovery,...
unlimited object storage image
Result Page: 415 414 413 412 411 410 409 408 407 406 405 404 403 402 401 400 399 398 397 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy