Home | Amazing | Today | Tags | Publishers | Years | Search 
Verification of Computer Codes in Computational Science and Engineering
Verification of Computer Codes in Computational Science and Engineering
How can one be assured that computer codes that solve differential equations are correct? Standard practice using benchmark testing no longer provides full coverage because today's production codes solve more complex equations using more powerful algorithms. By verifying the order-of-accuracy of the numerical algorithm implemented in the code, one...
Six-Legged Soldiers: Using Insects as Weapons of War
Six-Legged Soldiers: Using Insects as Weapons of War
"Six-Legged Soldiers is an excellent account of the affect arthropod-borne diseases have had on warfare...This book will inspire readers to understand...threats and prepare new methods to combat them."--Nature, November 2008

"Both science and military history buffs will learn much from Lockwood, a self-described skeptic
...
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
System-level Test and Validation of Hardware/Software Systems (Springer Series in Advanced Microelectronics)
New manufacturing technologies have made possible the integration of entire systems on a single chip. This new design paradigm, termed system-on-chip (SOC), together with its associated manufacturing problems, represents a real challenge for designers.

SOC is also reshaping approaches to test and validation activities. These are beginning to...

The Fly-Tying Bible: 100 Deadly Trout and Salmon Flies in Step-by-Step Photographs
The Fly-Tying Bible: 100 Deadly Trout and Salmon Flies in Step-by-Step Photographs
Avid sport fishermen will treasure this book?which is nearly as beautiful as the objects it describes. Fly-tying is a highly prized fisherman?s craft, but it?s also an art form, wonderfully captured in this volume?s hundreds of color photos. Each of 100 fly patterns is presented in a two-page spread: an enlarged photo and textual description on the...
SugarCRM For Dummies (Computer/Tech)
SugarCRM For Dummies (Computer/Tech)
SugarCRM is an innovative customer relationship management software solution that enhances your company’s marketing effectiveness, drives sales performance, improves customer satisfaction, and provides executive insight into business performance. SugarCRM For Dummies will show you to take advantage of this free, open source CRM...
Ultimate Guide to Wilderness Living: Surviving with Nothing But Your Bare Hands and What You Find in the Woods
Ultimate Guide to Wilderness Living: Surviving with Nothing But Your Bare Hands and What You Find in the Woods
Forget reality TV stunts like eating bugs, the Ultimate Guide to Wilderness Living provides in-depth instructions and step-by-step photos of real survival skills--exactly what one needs to stay alive in the woods. The book first covers immediate needs like starting a fire, erecting temporary shelter, and finding food. Then it goes beyond other...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

VMware VI3 Implementation and Administration
VMware VI3 Implementation and Administration

This is the most comprehensive guide to planning for, implementing, securing, maintaining, monitoring, and troubleshooting VMware VI3 in any IT environment. Written by Eric Siebert, a veteran VMware system administrator and one of only 300 vExperts named by VMware in 2009, this book will help IT professionals make the best...

Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
PHP Team Development
PHP Team Development
Given the nature of the business environment today, organizations that want to build value-added enterprise PHP applications need a team of PHP people rather than an individual. You've got a team! What next? Customizing such applications to meet with organizational objectives and maintaining these applications over time can be quite a tedious task...
Zend Enterprise PHP Patterns (Expert's Voice)
Zend Enterprise PHP Patterns (Expert's Voice)

Zend Enterprise PHP Patterns is the culmination of years of experience in the development of web-based applications designed to help enterprises big and small overcome the new challenges of the web-based application world and achieve harmony in not only the architecture of their application, but also the entire process under which that...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy