Home | Amazing | Today | Tags | Publishers | Years | Search 
Desk Reference of Clinical Pharmacology, Second Edition (CRC Desk Reference Series)
Desk Reference of Clinical Pharmacology, Second Edition (CRC Desk Reference Series)

Since the publication of the bestselling first edition of CRC Desk Reference of Clinical Pharmacology, dramatic discoveries in molecular medicine along with rapid technological advances have revolutionized the diagnosis and resulted in new medications to be used in the treatment of a broad range of human diseases. To stay abreast of...

Migrating to iPhone and iPad for .NET Developers
Migrating to iPhone and iPad for .NET Developers

Ever since I spotted and started reading my first computer book in 1981, I knew Information Technology (IT) was going to be an important part of my life. I feel privileged to have been able to make a career out of something I enjoy, and the fact that it changes on what seems to be a monthly basis means it never gets boring. It still...

Fundamentals of Scientific Computing (Texts in Computational Science and Engineering)
Fundamentals of Scientific Computing (Texts in Computational Science and Engineering)

Computers play an increasingly important role in our society. A breakdown of all computer systems would cause a breakdown of almost all activities of daily life. Furthermore, personal computers are available in almost every home in the industrialized world. But there is one sector where computers have a more strategic role, and that...

Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment

The Millennium Ecosystem Assessment (MA) was carried out between 2001 and 2005 to assess the consequences of ecosystem change for human well-being and to establish the basis for actions needed to enhance the conservation and sustainable use of ecosystems and their contributions to human well-being. The MA was originally conceived as a...

Windows Azure Step by Step
Windows Azure Step by Step

Windows Azure is the Microsoft cloud computing platform that lets developers leverage its powerful, scalable, and fault-tolerant infrastructure to build successful applications.

Windows Azure Step by Step provides an organized walkthrough of the Windows Azure platform and its related technologies. The text is...

Multidimensional Signal, Image, and Video Processing and Coding, Second Edition
Multidimensional Signal, Image, and Video Processing and Coding, Second Edition

This is a textbook for a first- or second-year graduate course for electrical and computer engineering (ECE) students in the area of digital image and video processing and coding. The course might be called Digital Image and Video Processing (DIVP) or some such, and has its heritage in the signal processing and communications areas of...

Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)
Digital Signal Processing with Field Programmable Gate Arrays (With CD-ROM)

Field-Programmable Gate Arrays (FPGAs) are on the verge of revolutionizing digital signal processing. Novel FPGA families are replacing ASICs and PDSPs for front end digital signal processing algorithms more and more. The efficient implementation of these algorithms is the main goal of this book. It starts with an overview of today's FPGA...

SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture
SOA for Profit, A Manager's Guide to Success with Service Oriented Architecture

Service-Oriented Architecture is becoming the leading architecture for IT, and it is changing the way organisations work. IT is slowly but steadily gaining maturity, and becoming the flexible yet stable and reliable support for business it should be. At the same time, IT is regaining its potential to create real business innovation. SOA will...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Knowledge Management and E-Learning
Knowledge Management and E-Learning

This work embraces two heretofore distinct fields of study, knowledge management and e-learning. In order to understand the impetus to link these two fields by a common thread, it is necessary to understand the two fields and the focus of each.

Knowledge management (KM) has developed as a field from its roots in data and...

Pattern Recognition and Machine Intelligence: 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011, Proceedings
Pattern Recognition and Machine Intelligence: 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011, Proceedings

This volume contains the proceedings of the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI-2011) which was held at the National Research University Higher School of Economics (HSE), Moscow, Russia, during June 27 - July 1, 2011. This was the fourth conference in the series. The first three...

Using LinkedIn
Using LinkedIn

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn currently has more than 65 million...

Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy