 |
|
 Excel for Teachers (Excel for Professionals series)This book is written by three teachers and a guy who teaches Excel. As the latter, I give all of the credit for this book to Adrienne, Bill H. and Colleen – it was their logic of classroom needs that made the book what it is. The population of teachers writing this book mirrors the real population – some know Excel well and some are new... |  |  Advances in Mass Data Analysis of Signals and Images in Medicine.The automatic analysis of images and signals in medicine, biotechnology, and chemistry is a challenging and demanding field.
Signal-producing procedures by microscopes, spectrometers, and other sensors have found their way into wide fields of medicine, biotechnology, economy, and environmental analysis. With this arises the problem of... |  |  |
|
 Software EvolutionSoftware has become omnipresent and vital in our information-based society, so all software producers should assume responsibility for its reliability. While "reliable" originally assumed implementations that were effective and mainly error-free, additional issues like adaptability and maintainability have gained equal importance... |  |  Modern Information Processing: From Theory to ApplicationsThe volume "Modern Information Processing: From Theory to Applications," edited by Bernadette Bouchon-Meunier, Giulianella Coletti and Ronald Yager, is a collection of carefully selected papers drawn from the program of IPMU'04, which was held in Perugia, Italy. The book represents the cultural policy of IPMU conference which... |  |  Advanced Web Technologies and ApplicationsThis book constitutes the refereed proceedings of the 6th Asia-Pacific Web Conference, APWeb 2004, held in Hangzhou, China, in April 2004.
The 60 revised full papers, 24 revised short papers, 15 revised poster papers, and 3 revised industrial papers presented together with 3 keynote papers and 3 invited papers were carefully reviewed and... |
|
 Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... |  |  A Practical Guide to Trusted ComputingUse Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes... |  |  Discovery ScienceThis book constitutes the refereed proceedings of the 5th International Conference on Discovery Science, DS 2002, held in Lübeck, Germany, in November 2002.
The 17 revised full papers and 27 revised short papers presented together with 5 invited contributions were carefully reviewed and selected from 76 submissions. The papers are... |
|
|
| Result Page: 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 |