 |
|
 Verification of Computer Codes in Computational Science and EngineeringHow can one be assured that computer codes that solve differential equations are correct? Standard practice using benchmark testing no longer provides full coverage because today's production codes solve more complex equations using more powerful algorithms. By verifying the order-of-accuracy of the numerical algorithm implemented in the code, one... |  |  Six-Legged Soldiers: Using Insects as Weapons of War"Six-Legged Soldiers is an excellent account of the affect arthropod-borne diseases have had on warfare...This book will inspire readers to understand...threats and prepare new methods to combat them."--Nature, November 2008 "Both science and military history buffs will learn much from Lockwood, a self-described skeptic... |  |  |
|
 The Fly-Tying Bible: 100 Deadly Trout and Salmon Flies in Step-by-Step PhotographsAvid sport fishermen will treasure this book?which is nearly as beautiful as the objects it describes. Fly-tying is a highly prized fisherman?s craft, but it?s also an art form, wonderfully captured in this volume?s hundreds of color photos. Each of 100 fly patterns is presented in a two-page spread: an enlarged photo and textual description on the... |  |  SugarCRM For Dummies (Computer/Tech)SugarCRM is an innovative customer relationship management software solution that enhances your company’s marketing effectiveness, drives sales performance, improves customer satisfaction, and provides executive insight into business performance. SugarCRM For Dummies will show you to take advantage of this free, open source CRM... |  |  |
|
 The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... |  |  PC Magazine Fighting Spyware, Viruses, and MalwareThink there's no malicious software on your computer? PC Magazine thinks you should think again.
Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by... |  |  VMware VI3 Implementation and AdministrationThis is the most comprehensive guide to planning for, implementing, securing, maintaining, monitoring, and troubleshooting VMware VI3 in any IT environment. Written by Eric Siebert, a veteran VMware system administrator and one of only 300 vExperts named by VMware in 2009, this book will help IT professionals make the best... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |