Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ABC of Palliative Care
ABC of Palliative Care

This brand new edition pulls together the most up-to-date information on this complex, multidisciplinary area in a practical, user-friendly manner. It deals with the important social and psychological aspects for palliative care of people with incurable diseases including quality of life, communication and bereavement issues.

...
Core JSP
Core JSP

In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a...

CMOS PLL Synthesizers: Analysis and Design (The International Series in Engineering and Computer Science)
CMOS PLL Synthesizers: Analysis and Design (The International Series in Engineering and Computer Science)
Thanks to the advance of semiconductor and communication technology,
the wireless communication market has been booming in the last two
decades. It evolved from simple pagers to emerging third-generation (3G)
cellular phones. In the meanwhile, broadband communication market has
also gained a rapid growth. As the market always
...
Design Criteria for Low Distortion in Feedback Opamp Circuits
Design Criteria for Low Distortion in Feedback Opamp Circuits
    Broadband opamps for multi-channel communication systems have strong demands on linearity performance. When these opamps are integrated in deep sub-micron CMOS technologies, the signal-swing has to occupy a large part of the rather low supply voltage to maintain the signal-to-noise-ratio. To obtain opamps with low distortion it...
Fundamentals of X Programming: Graphical User Interfaces and Beyond
Fundamentals of X Programming: Graphical User Interfaces and Beyond
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets. We pay special attention to applications that go beyond graphical user interfaces (GUIs); therefore we discuss issues affecting video games, visualization and imaging programs,...
Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

Managing IT in Government, Business & Communities
Managing IT in Government, Business & Communities
This guide presents the most current research and findings about the challenges governments around the world are now placing on small business IT entrepreneurs and how they are providing increased resources to support this emphasis. Described are how organizations and society rely heavily on virtual technologies for communication and how...
Flex 3 with Java
Flex 3 with Java

Flex 3 is a great technology for developing Rich Internet Applications for the Web as well as for the desktop. If you are a developer looking to design great-looking and sophisticated user interfaces that resemble desktop-based applications, and want to utilize an existing server technology such as Java to develop RIAs, this book is for you.

...
Soft Computing in Image Processing (Studies in Fuzziness and Soft Computing)
Soft Computing in Image Processing (Studies in Fuzziness and Soft Computing)

Images have always been very important in human life. Their applications range from primitive communication between humans of all ages to advanced technologies in the industrial, medical and military field. The increased possibilities to capture and analyze images have contributed to the largeness that the scientific field of image processing...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

Insight into IELTS Student's Book Updated edition: The Cambridge IELTS Course
Insight into IELTS Student's Book Updated edition: The Cambridge IELTS Course

Insight into IELTS New Edition offers comprehensive preparation for the IELTS examination. The course develops skills, language and familiarity with each paper progressively, and the Speaking section has been updated to reflect the new format of the Speaking Paper (in effect from July 2001). Exam-type exercises are a regular feature, and the...

New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

unlimited object storage image
Result Page: 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy