Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Fractional Calculus (FC) has originated in 1695, nearly at the same time as conventional calculus. However, FC attracted limited attention and remained a pure mathematical exercise in spite of the original contributions of important mathematicians, physicists and engineers. FC had a rapid development during the last few decades, both in...
The Massachusetts General Hospital Guide to Depression: New Treatment Insights and Options (Current Clinical Psychiatry)
The Massachusetts General Hospital Guide to Depression: New Treatment Insights and Options (Current Clinical Psychiatry)

Major Depressive Disorder (MDD) is one of the most prevalent psychiatric disorders, with a lifetime prevalence rate of roughly 20%. MDD is a leading cause of disability and premature death worldwide, leads to greater impairment in work functioning than other chronic medical conditions, and has an estimated annual cost of $210 billion...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps
Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps

Gamification may be a new term, but the idea of using game-thinking and game mechanics to solve problems and engage audiences isn’t exactly new. The military has been using games and simulations for hundreds (if not thousands) of years, and the U.S. military has been a pioneer in the use of video games across branches. Three...

How We Cooperate: A Theory of Kantian Optimization
How We Cooperate: A Theory of Kantian Optimization
A new theory of how and why we cooperate, drawing from economics, political theory, and philosophy to challenge the conventional wisdom of game theory

Game theory explains competitive behavior by working from the premise that people are self-interested. People don’t just compete, however; they also
...
The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
Type 2 Diabetes: Cardiovascular and Related Complications and Evidence-Based Complementary Treatments
Type 2 Diabetes: Cardiovascular and Related Complications and Evidence-Based Complementary Treatments

Approximately 29 million Americans are diagnosed with Type 2 diabetes annually. Of that number, only about 36 percent (10.44 million diabetes sufferers) achieve satisfactory medical outcomes and would need additional help?rarely available?to reliably control their glucose levels. Contrary to popular belief, although anti-diabetic...

Fundamentals of Ultra-Thin-Body MOSFETs and FinFETs
Fundamentals of Ultra-Thin-Body MOSFETs and FinFETs

Understand the theory, design and applications of the two principal candidates for the next mainstream semiconductor-industry device with this concise and clear guide to FD/UTB transistors. • Describes FD/SOI MOSFETs and 3-D FinFETs in detail • Covers short-channel effects, quantum-mechanical effects, applications of UTB devices to...

Mission-Critical Network Planning
Mission-Critical Network Planning
I wrote this book in the aftermath of the terrorist attacks that took place on September
11, 2001. Until then, I was planning to write this book at a much later time. But
the events of that day compelled me to immediately begin this work. As we have
seen, those events have had far-reaching repercussions in the information
...
AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach
Analysis and Control of Boolean Networks: A Semi-tensor Product Approach

Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical function can be expressed as a conventional discrete-time linear system. In the light of...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Result Page: 40 39 38 37 36 35 34 33 32 31 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy