 |
|
 A First Course in Fourier AnalysisThis unique book provides a meaningful resource for applied mathematics through Fourier analysis. It develops a unified theory of discrete and continuous (univariate) Fourier analysis, the fast Fourier transform, and a powerful elementary theory of generalized functions and shows how these mathematical ideas can be used to study sampling theory,... |  |  Radar Systems Analysis and Design Using MATLABNumerous books have been written on Radar Systems and Radar Applications. A limited set of these books provides companion software. There is need for a comprehensive reference book that can provide the reader with hands-on-like experience. The ideal radar book, in my opinion, should serve as a conclusive, detailed, and useful reference for working... |  |  Electricity And Magnetism (Physics in Our World)THE NUCLEAR BOMBS that ended World War II in 1945 were a convincing and frightening demonstration of the power of physics. A product of some of the best scientific minds in the world, the nuclear explosions devastated the Japanese cities of Hiroshima and Nagasaki, forcing Japan into an unconditional surrender. But even though the atomic bomb... |
|
 SymmetrySTARTING from the somewhat vague notion of symmetry = harmony of proportions, these four lectures gradually develop first the geometric concept of symmetry in its several forms, as bilateral, translatory, rotational, ornamental and crystallographic symmetry, etc., and finally rise to the general idea underlying all these special forms, namely that... |  |  Bioinformatics - From Genomes to Therapies"This treatise on bioinformatics is an excellent reference set to use as additional reading in advanced undergraduate and graduate courses..." (ChemMedChem, October 2007)
Once again, Thomas Lengauer has succeeded in creating a comprehensive and immensely useful resource that meets even the high... |  |  |
|
|
 Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  Crime Mapping Case Studies: Practice and ResearchCrime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,... |  |  Microsoft Visual C# 2008 Express Edition: Build a Program Now! (PRO-Developer)Microsoft Visual C# 2008 Express Edition (and the other Visual Studio 2008 Express Edition products) is, in my opinion, one of the best and most intelligent ideas to come from the Developer Division at Microsoft. I'm applauding and cheering for the people who had this brilliant idea because I believe there is a real need and demand for a... |
|
| Result Page: 966 965 964 963 962 961 960 959 958 957 956 955 954 953 952 951 950 949 948 |