|
|
|
|
Brain Metastases (Cancer Treatment and Research)
Brain metastases are among the most feared and debilitating complication of
systemic cancer. They impact approximately 170 000 patients a year in the United
States, a number ten-fold greater than malignant gliomas. Historically, brain metastases
were diagnosed in patients with widespread systemic malignancy. Recent
improvements... | | Twisted Network Programming Essentials
Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using... | | High Impact Data Visualization with Power View, Power Map, and Power BI
High Impact Data Visualization with Power View, Power Map, and Power BI helps you take business intelligence delivery to a new level that is interactive, engaging, even fun, all while driving commercial success through sound decision-making. Learn to harness the power of Microsoft’s flagship, self-service business intelligence... |
|
Branding For Dummies
Discover how brands are created, managed, differentiated, leveraged, and licensed
Whether your business is large or small, global or local, this new edition of Branding For Dummies gives you the nuts and bolts to create, improve, and maintain a successful brand. It'll help you define your company's mission,... | | SDL Game Development: (Black & White)
BLACK & WHITE EDITION
If you're good with C++ and object oriented programming, this book utilizes your skills to create 2D games using the Simple DirectMedia Layer API. Practical tutorials include the development of two wickedly good games.
Overview
-
Create 2D reusable games using...
| | |
|
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around... | | Parallel Programming: for Multicore and Cluster Systems
Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be... | | Helping Kids with Coding For Dummies
Help for grown-ups new to coding
Getting a jump on learning how coding makes technology work is essential to prepare kids for the future. Unfortunately, many parents, teachers, and mentors didn't learn the unique logic and language of coding in school. Helping Kids with Coding For Dummies comes to the... |
|
Understanding Enterprise SOAThis book is for anyone in the business world or in the public sector who needs to make sense of the new emerging standards for virtually all major information technology decisions. For business professionals, this book is meant to explain and clarify—in business terms—the way web services and SOA work in a business setting. For IT... | | | | Computer Network SecurityA comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and... |
|
|
Result Page: 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 |