Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source GIS: A GRASS GIS Approach (The International Series in Engineering and Computer Science)
Open Source GIS: A GRASS GIS Approach (The International Series in Engineering and Computer Science)
GRASS GIS software was developed in response to the need for improved
analysis of landscape “trade offs” in managing government lands and the
emerging potential of computer-based land analysis tools. During the last
decades of the 20th century, government land managers in the U.S. (and
across the world) faced
...
Microsoft Office Access 2003: The Complete Reference
Microsoft Office Access 2003: The Complete Reference

The Definitive Resource on Access 2003

CD-ROM contains quick reference section on Access 2003--plus sample database files that support the book's material

Scale mountains of data with a single application with the help of this comprehensive resource. Through detailed, step-by-step instructions, you'll learn how to design and...

Asterisk Hacking
Asterisk Hacking
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all...
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Immunology and Evolution of Infectious Disease
Immunology and Evolution of Infectious Disease

From HIV to influenza, the battle between infectious agents and the immune system is at the heart of disease. Knowledge of how and why parasites vary to escape recognition by the immune system is central to vaccine design, the control of epidemics, and our fundamental understanding of parasite ecology and evolution. As the first comprehensive...

Java EE 5 Development with NetBeans 6
Java EE 5 Development with NetBeans 6

Java EE 5, the successor to J2EE, greatly simplifies the development of enterprise applications. The popular IDE, NetBeans, has several features that greatly simplify Java EE 5 development, and this book shows you how to make use of these features to make your Java programming more efficient and productive than ever before. With many features...

Molecular Plant Immunity
Molecular Plant Immunity

Molecular Plant Immunity provides an integrated look at both well-established and emerging concepts in plant disease resistance providing the most current information on this important vitally important topic within plant biology. Understanding the molecular basis of the plant immune system has implications on the development of new...

Arctic Security in an Age of Climate Change
Arctic Security in an Age of Climate Change

This is the first book to examine Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway, and the United States, as well as Iceland, Sweden, and Finland, are grappling with an emerging Arctic...

Multi-Sensor Data Fusion with MATLAB®
Multi-Sensor Data Fusion with MATLAB®

Using MATLAB® examples wherever possible, Multi-Sensor Data Fusion with MATLAB explores the three levels of multi-sensor data fusion (MSDF): kinematic-level fusion, including the theory of DF; fuzzy logic and decision fusion; and pixel- and feature-level image fusion. The authors elucidate DF...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Fiber Optic Sensors (Optical Science and Engineering)
Fiber Optic Sensors (Optical Science and Engineering)

This reference presents a comprehensive account of the recent advances and research in fiber optic sensor technology. It offers a progressive history of each sensor type as well as basic principles and fundamental building blocks for practical applications in the electrical aerospace, defense and manufacturing, smart structure, undersea...

unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy