Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cytokines and Autoimmune Diseases
Cytokines and Autoimmune Diseases

Leading researchers synthesize scattered experimental data to help develop an intimate understanding of how cytokines and chemokines are involved in the pathogenesis of autoimmune diseases. The many chapters offer critical reviews the basic mechanisms controlling cytokine induction and regulation, as well as the resulting production of...

American Bar Association Family Legal Guide
American Bar Association Family Legal Guide
The American Bar Association Family Legal Guide offers the most comprehensive, useful, and authoritative information available on how the law affects individuals at home, at work, and at play. This practical guide will help consumers steer clear of many legal pitfalls and will guide readers to a better understanding of their rights and...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Internet of Things with Intel Galileo
Internet of Things with Intel Galileo

Employ the Intel Galileo board to design a world of smarter technology for your home

About This Book

  • Discover some of Galileo's best development options using Arduino and Node.js
  • Build complex projects in the field of Internet of Things and integrate with IoT platforms
  • ...
Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life
Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life

Many people suffer from relationships that leave them feeling manipulated and out of control. Whether it's within the context of a personal relationship, a family member, a friend, or someone at the workplace, these "toxic" relationships can erode a person's self-confidence and self-esteem, and have a strong, negative effect on their...

Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Amobile adhoc network, is a system of autonomous mobile terminals connected by wireless links. Being independent of any infrastructure, these networks have the ability to be deployed easily, fast and cost efficient. The objective of this thesis is to exploit the advantages of the application of Code Division Multiple Access (CDMA) in the lower...
Manage IT!: Organizing IT Demand and IT Supply
Manage IT!: Organizing IT Demand and IT Supply
"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good...
Programming Arduino: Getting Started With Sketches
Programming Arduino: Getting Started With Sketches
Arduino interface boards provide a low-cost, easy-to-use technology to create microcontrollerbased projects. With a little electronics, you can make your Arduino do all sorts of things, from controlling lights in an art installation to managing the power on a solar energy system.

There are many
...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Underwater Robots (Springer Tracts in Advanced Robotics)
Underwater Robots (Springer Tracts in Advanced Robotics)

This book, now at the third edition, addresses the main control aspects in underwater manipulation tasks. The mathematical model with significant impact on the control strategy is discussed. The problem of controlling a 6-degrees-of-freedoms autonomous underwater vehicle is deeply investigated and a survey of fault detection/tolerant...

Programming the Microsoft Windows Driver Model
Programming the Microsoft Windows Driver Model
Microsoft’s new driver model for Windows 98 and Windows 2000 supports Plug and Play, provides power management capabilities, and expands on the driver/minidriver approach. Written by device-driver expert Walter Oney in cooperation with the Windows DDK team, this book provides extensive practical examples, illustrations, advice, and...
SolidWorks 2010: No Experience Required
SolidWorks 2010: No Experience Required

Whether you are a new user of SolidWorks or a professional who wants to improve your skills, this book was written for you. Learning any software can be difficult at times. You launch the software for the first time, and you feel overwhelmed, not knowing how to even start a new document. In 3D CAD programs, it can be especially difficult....

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy