 |
|
 Theory of Information: Fundamentality, Diversity and Unification
This unique volume presents a new approach - the general theory of information - to scientific understanding of information phenomena. Based on a thorough analysis of information processes in nature, technology, and society, as well as on the main directions in information theory, this theory synthesizes existing directions into a unified... |  |  Sams Teach Yourself Adobe Creative Suite All in One
Sams Teach Yourself Adobe Suite All in One has all the answers for beginning users of Adobe¿s graphics products in one big, easy to use book. It doesn¿t assume the reader wants to learn how to use just one product, but covers multiple products and technologies together in a logical, well-integrated... |  |  Deja Review Obstetrics & Gynecology
“Flash cards in a book” for the Obstetrics & Gynecology shelf-exam and the USMLE Step 2 CK -- written by students, for students
". . . well organized and an easy read for the medical student looking to get a concise review on relevant content, material, and concepts tested on the USMLE Step... |
|
|
|
 VHDL 101: Everything you need to know to get started
VHDL (VHSIC Hardware Description Language) is a hardware programming language commonly used for FPGA (Field Programable Gate Array) or ASIC (Application Specific Integrated Circuit) designs. FPGAs and the like are often found within larger applications such as cell phones, medical imagers, and personal media devices. As these devices are... |  |  Oracle CRM On Demand Dashboards (Osborne ORACLE Press Series)
Design and Deliver Oracle CRM On Demand Dashboards
Create custom, interactive dashboards to deliver actionable business intelligence directly to end users with help from this Oracle Press guide. Oracle CRM On Demand Dashboards provides comprehensive coverage of the versatile features available in Oracle Answers On Demand... |  |  Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... |
|
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 |