Home | Amazing | Today | Tags | Publishers | Years | Search 
Ubiquitous Computing: Smart Devices, Environments and Interactions
Ubiquitous Computing: Smart Devices, Environments and Interactions
This book is primarily aimed at computer scientists and technologists in education and industry to enable them to keep abreast of the latest developments, across a diverse field of computing, all in one text. Its aim is to also to promote a much more cross disciplinary exchange of ideas within the sub fields of computing and between computer...
Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

Models in Hardware Testing: Lecture Notes of the Forum in Honor of Christian Landrault (Frontiers in Electronic Testing)
Models in Hardware Testing: Lecture Notes of the Forum in Honor of Christian Landrault (Frontiers in Electronic Testing)

Model based testing is the most powerful technique for testing hardware and software systems. Models in Hardware Testing describes the use of models at all the levels of hardware testing. The relevant fault models for nanoscaled CMOS technology are introduced, and their implications on fault simulation, automatic test pattern...

Beginning BlackBerry Development
Beginning BlackBerry Development

Are you a Java programmer looking for a new challenge and money-making opportunity? If so, Beginning BlackBerry Development may just be the book for you. This book will teach you everything you need to know to start developing apps that run on the BlackBerry family of devices and smartphones. With over 50 Million BlackBerry devices sold...

Efficiency Instead of Justice?: Searching for the Philosophical Foundations of the Economic Analysis of Law (Law and Philosophy Library)
Efficiency Instead of Justice?: Searching for the Philosophical Foundations of the Economic Analysis of Law (Law and Philosophy Library)

Economic analysis of law is an interesting and challenging attempt to employ the concepts and reasoning methods of modern economic theory so as to gain a deeper understanding of legal problems. According to Richard A. Posner it is the role of the law to encourage market competition and, where the market fails because transaction costs are too...

Cases on Collaboration in Virtual Learning Environments: Processes and Interactions
Cases on Collaboration in Virtual Learning Environments: Processes and Interactions
As emerging technologies increase the potential for constructivist learning processes and responses, it is critical that educational researchers, instructional designers, cognitive scientists, and information scientists become more aware of advances in these correlating fields. Cases on Collaboration in Virtual Learning Environments:...
Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all...

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
Essential LINQ
Essential LINQ

“Charlie and Dinesh bring important skills to this project that enable them to show how LINQ works and the practical ways you can use it in your daily development process.”

From the Foreword by Anders Hejlsberg

 

Drug-related problems in the elderly
Drug-related problems in the elderly

The number of elderly is increasing in the developed part of the world. With increasing age the prevalence of many diseases will increase. This promotes high use of drugs. For all health care professionals, it is essential to be aware of the possible risks and difficulties with drugs in the elderly. In this book, the authors describe these...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy