Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
Abdominal Ultrasound: How, Why and When
Abdominal Ultrasound: How, Why and When
Ultrasound continues to be one of the most important diagnostic tools at our disposal. It is used by a wide range of healthcare professionals across many applications. This book is intended as a practical, easily accessible guide to sonographers and those learning and developing in the field of abdominal ultrasound. The most obvious drawbacks of...
Modelling Stochastic Fibrous Materials with Mathematica® (Engineering Materials and Processes)
Modelling Stochastic Fibrous Materials with Mathematica® (Engineering Materials and Processes)
Recent developments in the use of electrospun fibrous materials, for application as scaffolds for tissue engineering and in the application of carbon fibrous materials in fuel cells, has generated new interest in the dependence of the properties and structure of these materials on those of their constituent fibres. Modelling Stochastic Fibrous...
Information Flow Control for Java: A Comprehensive Approach Based on Path Conditions in Dependence Graphs
Information Flow Control for Java: A Comprehensive Approach Based on Path Conditions in Dependence Graphs

This thesis presents several precise techniques that analyze object-oriented languages for security violations, together with evaluations on Java benchmarks. The key question that will be targeted throughout this work is “Can a given statement directly or indirectly influence another statement, and if this is possible, how can this...

HTML5: Your visual blueprint for designing rich Web pages and applications
HTML5: Your visual blueprint for designing rich Web pages and applications

Use the latest version of HTML to create dynamic Web pages

HTML5 is the latest iteration of the standard markup language for creating Web pages. It boasts extensive updates from its predecessor and allows you to incorporate rich media content into a site without any dependence on extra software such as Flash. Packed with...

Wave Goodbye to Type 2 Diabetes: 16 Holistic Lifestyle Practices to Prevent & Reverse Diabetes & Reclaim Joy, Vitality, & Plenty
Wave Goodbye to Type 2 Diabetes: 16 Holistic Lifestyle Practices to Prevent & Reverse Diabetes & Reclaim Joy, Vitality, & Plenty

Has diabetes or wild blood sugar swings taken you prisoner? Discover how to break free from being sick, tired, and symptomatic.

“Contrary to what conventional medicine generally believes, type 2 diabetes is reversible… even preventable. All the secrets for how to do this are right here in this engaging...

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...

Bioimaging in Neurodegeneration (Contemporary Neuroscience)
Bioimaging in Neurodegeneration (Contemporary Neuroscience)

Bioimaging is in the forefront of medicine for the diagnosis and helps to predict the progression of AD via mild cognitive treatment of neurodegenerative disease. Conventional magnetic impairment (MCI) studies. resonance imaging (MRI) uses interactive external magnetic fields Novel neuroimaging technologies, such as neuromolecular and...

Web Programming with HTML5, CSS, and JavaScript
Web Programming with HTML5, CSS, and JavaScript
Web Programming with HTML 5, CSS, and JavaScript is written for the undergraduate, client-side web programming course. It covers the three client-side technologies (HTML5, CSS, and JavaScript) in depth, with no dependence on server-side technologies. One of the distinguishing features of this new text is its coverage of canvas, one of the most...
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
For many organizations their dependence on information systems, both within the company
and networked up and down their supply chain, is now business critical. Any sustained loss
of availability of these systems would threaten the very existence of the business.

Security is a holistic issue. Vulnerabilities in physical,
...
Merciful Judgments and Contemporary Society: Legal Problems, Legal Possibilities
Merciful Judgments and Contemporary Society: Legal Problems, Legal Possibilities

Merciful Judgments in Contemporary Society: Legal Problems/Legal Possibilities explores the tension between law's need for and dependence on merciful judgments and suspicions that regularly accompany them. Rather than focusing primarily on definitional questions or the longstanding debate about the moral worth and importance of mercy,...

Configuring and Tuning Databases on the Solaris Platform
Configuring and Tuning Databases on the Solaris Platform

Modern corporations demand a high level of service from their IT environ- ments. Today's successful datacenter architectures consist of multiple tiers that use well-tuned and high-performance servers at every level.

Sun refers to this as the "end-to-end architecture." Typical tiers include powerful database...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy