 |
|
|
 Mathematical Modeling for Complex Fluids and Flows
Mathematical Modeling for Complex Fluids and Flows provides researchers and engineering practitioners encountering fluid flows with state-of-the-art knowledge in continuum concepts and associated fluid dynamics. In doing so it supplies the means to design mathematical models of these flows that adequately express the engineering physics... |  |  Chondral Disease of the Knee: A Case-Based Approach
This valuable resource, derived from Drs. Cole and Malek’s Articular Cartilage Lesions: A Practical Guide to Assessment and Treatment, features case studies that help the reader develop an understanding of chondral disease and hone the decision-making skills integral to successful cartilage repair and solution implementation. Each case... |  |  Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... |
|
|
 Mastering VMware Horizon 6
Unlock the advanced features and full power of VMware Horizon 6 to deliver the industry's most comprehensive end-to-end user experience
About This Book
-
Learn why a EUC strategy is important, what it can deliver, and the approach you should take when starting out with your own project
- ...
|  |  Cigarette Smoke and Oxidative Stress
The mechanism by which cigarette smoke causes or contributes to inflammatory diseases like chronic obstructive pulmonary disease, cardiovascular disease and cancer remains unclear. Recent developments in our knowledge of cellular signaling suggest that cigarette smoke may cause oxidative stress in cellular systems. The assessment,... |  |  The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security... |
|
| Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 |