Home | Amazing | Today | Tags | Publishers | Years | Search 
CAD, 3D Modeling, Engineering Analysis, and Prototype Experimentation: Industrial and Research Applications
CAD, 3D Modeling, Engineering Analysis, and Prototype Experimentation: Industrial and Research Applications

This succinct book focuses on computer aided design (CAD), 3-D modeling, and engineering analysis and the ways they can be applied effectively in research and industrial sectors including aerospace, defense, automotive, and consumer products. These efficient tools, deployed for R&D in the laboratory and the field, perform efficiently...

Cocos2d-X Game Development Blueprints
Cocos2d-X Game Development Blueprints

Build a plethora of games for various genres using one of the most powerful game engines, Cocos2d-x

About This Book

  • Explore the powerful features of Cocos2d-x and use them to your advantage
  • Tackle commonly faced problems while creating popular 2D games
  • A step-by-step guide...
Micronutrients and HIV Infection (Modern Nutrition)
Micronutrients and HIV Infection (Modern Nutrition)

Analogous to other infections, evidence suggests that improved micronutrient intake may reduce HIV transmission and progression, as well as morbidity from common and opportunistic infections. This is important information, considering many in the world's HIV-infected population do not yet have access to anti-retroviral drugs....

The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Netcentric System of Systems Engineering with DEVS Unified Process
Netcentric System of Systems Engineering with DEVS Unified Process

Addressing the new challenges that engineers face, this book presents fundamental concepts to help tackle the integration of modeling and simulation with command, and control systems of systems through the use of concepts and standards for interoperability and testing based on the Discrete Event Systems Specification Unified Process. The text...

Arctic Security in an Age of Climate Change
Arctic Security in an Age of Climate Change

This is the first book to examine Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway, and the United States, as well as Iceland, Sweden, and Finland, are grappling with an emerging Arctic...

Getting a Big Data Job For Dummies
Getting a Big Data Job For Dummies

Hone your analytic talents and become part of the next big thing

Getting a Big Data Job For Dummies is the ultimate guide to landing a position in one of the fastest-growing fields in the modern economy. Learn exactly what "big data" means, why it's so important across all industries, and how you can...

Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

The Complement System: Novel Roles in Health and Disease
The Complement System: Novel Roles in Health and Disease

As a phylogenetically old system complement is now regarded as a part of innate immunity. But it is much more than that. It bridges innate and adapted immunity, participates not only in host defense but also in many essential physiological processes, old and new diseases and adverse conditions. Indeed, complement became a term that almost...

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy