Home | Amazing | Today | Tags | Publishers | Years | Search 
Numerical Linear Approximation in C (CRC Numerical Analysis & Scientific Computing)
Numerical Linear Approximation in C (CRC Numerical Analysis & Scientific Computing)
Illustrating the relevance of linear approximation in a variety of fields, Numerical Linear Approximation in C presents a unique collection of linear approximation algorithms that can be used to analyze, model, and compress discrete data. Developed by the lead author, the algorithms have been successfully applied to several...
Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Neuroergonomics: The Brain at Work (Oxford Series in Human-Technology Interaction)
Neuroergonomics: The Brain at Work (Oxford Series in Human-Technology Interaction)
Neuroergonomics can be defined as the study of brain and behavior at work. It combines two disciplines--neuroscience, the study of brain function, and human factors, the study of how to match technology with the capabilities and limitations of people so they can work effectively and safely. The goal of merging these two fields is to use the...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Computational Physics
Computational Physics
Computational physics book that emphasizes the physics that can be done with numerical/computational methods rather than just the methods themselves. Uses True Basic. (Representative programs on WWW). Praised for its coverage of many interesting topics in pure and applied physics.

From the Publisher
...
Genetics Databases (Biological Techniques Series)
Genetics Databases (Biological Techniques Series)
Computer access is the only way to retrieve up-to-date nucleic acid and protein sequence and structure information.
This book, edited by Martin Bishop, describes the available information and where to find it, and is essential reading for any researcher puzzled by the wealth of on-line data.
The reader will be guided through the maze of
...
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Game Theory: A Critical Introduction
Game Theory: A Critical Introduction
As ever there are people and cats to thank. There is also on this occasion electronic mail. The first draft of this book took shape in various cafeterias in Florence during YV’s visit to Europe in 1992 and matured on beaches and in restaurants during SHH’s visit to Sydney in 1993. Since then the mail wires between Sydney and Norwich, or...
How to Write a Great Research Paper (Wiley Keys to Success)
How to Write a Great Research Paper (Wiley Keys to Success)
Research like a pro–and write a winning paper!

Do research papers make you nervous? Don’t panic! This task isn’t as overwhelming as it may seem––and conducting good research is an important skill to have. With How to Write a Great Research Paper, you’ll see how easy and rewarding it can be to explore a...

Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy