Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers
Computing is transforming our society in ways that are as profound as the changes wrought by physics and chemistry in the previous two centuries. Indeed, there is hardly an aspect of our lives that hasn't already been influenced, or even revolutionized, by digital technology. Given the importance of computing to modern society,...
1: Cartilage and Osteoarthritis (Methods in Molecular Medicine)
1: Cartilage and Osteoarthritis (Methods in Molecular Medicine)

Osteoarthritis (OA), the most common form of arthritis, is generally characterized by a slowly progressive degeneration of articular cartilage, particularly in the weight-bearing joints. It has a stronger prevalence in women, and its incidence increases with age. OA is a major and growing health concern in developed countries, owing to...

The Scientific Revolution and the Foundations of Modern Science (Greenwood Guides to Historic Events 1500-1900)
The Scientific Revolution and the Foundations of Modern Science (Greenwood Guides to Historic Events 1500-1900)
Applebaum offers beginning university students the perfect introduction to the age of the scientific revolution from 1500 to 1800. Many scientific ideas and much medical information improved dramatically during those times as investigators began a relentless drive, which continues today, toward a better understanding of the natural world....One...
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Indra's Net and the Midas Touch: Living Sustainably in a Connected World
Indra's Net and the Midas Touch: Living Sustainably in a Connected World

We live today in a global web of interdependence, connected technologically, economically, politically, and socially. As a result of these expanding and deepening interdependencies, it has become impossible fully to control -- or foretell -- the effects of our actions. The world is rife with unintended consequences. The first law of human...

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

Enabling Technologies for Mobile Services: The MobiLife Book
Enabling Technologies for Mobile Services: The MobiLife Book
This book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that...
Great Events From History: The 20th Century, 1941-1970
Great Events From History: The 20th Century, 1941-1970

This is a unique resource: Nothing is comparable with this much depth or numbers that covers so many 20th century events.??AAGreat Events from History: The Twentieth Century, 1941-1970??AA, is the ninth installment in Salem Press' ongoing ??AAGreat Events from History??AA series. This six-volume set contains 1,112 essays on more than 1,100...

Advanced Social Media Marketing: How to Lead, Launch, and Manage a Successful Social Media Program
Advanced Social Media Marketing: How to Lead, Launch, and Manage a Successful Social Media Program

Hundreds of millions of Americans are using social media (SM), and already some 70% of businesses have joined them there, using Facebook and other SM platforms to connect with their customers, and attract new ones. So the real question isn’t whether to take your business onto social media platforms—but how to do it quickly,...

Calm Technology: Principles and Patterns for Non-Intrusive Design
Calm Technology: Principles and Patterns for Non-Intrusive Design

How can you design technology that becomes a part of a user’s life and not a distraction from it? This practical book explores the concept of calm technology, a method for smoothly capturing a user’s attention only when necessary, while calmly remaining in the background most of the time. You’ll learn how to design...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy