Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

A History of Mathematics: From Mesopotamia to Modernity
A History of Mathematics: From Mesopotamia to Modernity

A History of Mathematics covers the evolution of mathematics through time and across the major Eastern and Western civilizations. It begins in Babylon, then describes the trials and tribulations of the Greek mathematicians. The important, and often neglected, influence of both Chinese and Islamic mathematics is covered in detail,...

American Criminal Courts: Legal Process and Social Context
American Criminal Courts: Legal Process and Social Context

American Criminal Courts: Legal Process and Social Context provides a complete picture of both the theory and day-to-day reality of criminal courts in the United States. The book begins by exploring how democratic processes affect criminal law, the documents that define law, the organizational structure of courts at the federal...

Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises

After the mainframe and personal computer eras, the third major era in computer science, ubiquitous computing, describes the state of technology in which networked computers would surround every user.

Ubiquitous Computing Technology for Real Time Enterprises combines the fundamental methods, algorithms, and concepts of...

The Dynamics of Radicalization: A Relational and Comparative Perspective
The Dynamics of Radicalization: A Relational and Comparative Perspective

Why is it that some social movements engaged in contentious politics experience radicalization whereas others do not? The Dynamics of Radicalization offers an innovative reply by investigating how and when social movement organizations switch from a nonviolent mode of contention to a violent one. Moving beyond existing explanations...

Misadventures in Health Care: Inside Stories (Human Error and Safety)
Misadventures in Health Care: Inside Stories (Human Error and Safety)

Misadventures in Health Care: Inside Stories presents an alternative approach to attributing the cause of medical error solely to the health care provider. That alternative, the systems approach, pursues why an incident occurs in terms of factors in the context of care that affect the care provider to induce an error. The basis for...

Android Programming for Beginners: Build in-depth, full-featured Android apps starting from zero programming experience, 3rd Edition
Android Programming for Beginners: Build in-depth, full-featured Android apps starting from zero programming experience, 3rd Edition

Learn the Java and Android skills you need to start developing powerful mobile applications with the help of actionable steps

Key Features

  • Kick-start your Android programming career or just have fun publishing apps to the Google Play marketplace
  • Get a first principles...
Model-Driven Testing: Using the UML Testing Profile
Model-Driven Testing: Using the UML Testing Profile
Model-driven development has become the most important new paradigm in software development and has already demonstrated considerable impact in reducing time to market and improving product quality. However, the development of high-quality systems not only requires systematic development processes but also systematic test processes.

This book...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Service-Oriented Computing: ICSOC 2010 International Workshops PAASC
Service-Oriented Computing: ICSOC 2010 International Workshops PAASC

Welcome to the workshop program of the 8th International Conference on Service Oriented Computing (ICSOC 2010), held in San Francisco, December 2010. These workshop proceedings represent high-quality research and industry papers that showcase recent and new working developments in service-oriented computing and related fields.

...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Beginning API Development with Node.js: Build highly scalable, developer-friendly APIs for the modern web with JavaScript and Node.js
Beginning API Development with Node.js: Build highly scalable, developer-friendly APIs for the modern web with JavaScript and Node.js

Learn everything you need to get up and running with cutting-edge API development using JavaScript and Node.js; ideal for data-intensive real-time applications that run across multiple platforms.

Key Features

  • Build web APIs from start to finish using JavaScript across the development...
unlimited object storage image
Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy