Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Applications in Engineering, Life and Social Sciences (De Gruyter Reference)
Fractional Calculus (FC) has originated in 1695, nearly at the same time as conventional calculus. However, FC attracted limited attention and remained a pure mathematical exercise in spite of the original contributions of important mathematicians, physicists and engineers. FC had a rapid development during the last few decades, both in...
Artificial Cognition Systems
Artificial Cognition Systems
The central questions confronting artificial intelligence and cognitive science revolve around the nature of meaning and of mind. Minds are presumed to be the processors of mental content, where that content has the capacity to influence our speech and other behavior. The hard part is figuring out how that is done. Mental states must exercise...
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

A Logical Approach to Discrete Math (Monographs in Computer Science)
A Logical Approach to Discrete Math (Monographs in Computer Science)

This text attempts to change the way we teach logic to beginning students. Instead of teaching logic as a subject in isolation, we regard it as a basic tool and show how to use it. We strive to give students a skill in the propositional and predicate calculi and then to exercise that skill thoroughly in applications that arise in computer...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Novel Therapeutic Targets for Antiarrhythmic Drugs
Novel Therapeutic Targets for Antiarrhythmic Drugs

Profiles potential treatment approaches for cardiac arrhythmias

Cardiac arrhythmias of ventricular origin are responsible for the deaths of nearly half a million Americans each year while atrial fibrillation accounts for about 2.3 million cases per year, a rate that is projected to increase 2.5 fold over the next half...

Basic Geotechnical Earthquake Engineering
Basic Geotechnical Earthquake Engineering

This title features subject matter that is organised logically to make it easy and interesting for the students. Emphasis has been given on the basics of geotechnical earthquake engineering. Home work problems have been given at the end of each chapter to test the understanding of concepts given in the chapter. At the end of appropriate...

Mastering Sublime Text
Mastering Sublime Text

When it comes to cross-platform text and source code editing, Sublime Text has few rivals. This book will teach you all its great features and help you develop and publish plugins. A brilliantly inclusive guide.

Overview

  • Discover efficient, keyboard-driven text editing
  • Recognize the latest...
Digital Photography: Expert Techniques
Digital Photography: Expert Techniques

Ready to take digital imaging to the professional level? This advanced strategy book offers expert advice to help you become more competent in your work routine, but it is not your ordinary workflow book. Through step-by-step procedures based on hard-nosed experience, professional photographer Ken Milburn covers much more...

User Story Mapping: Discover the Whole Story, Build the Right Product
User Story Mapping: Discover the Whole Story, Build the Right Product

User story mapping is a valuable tool for software development, once you understand why and how to use it. This insightful book examines how this often misunderstood technique can help your team stay focused on users and their needs without getting lost in the enthusiasm for individual product features.

Author Jeff...

Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Modelling Distributed Systems (Texts in Theoretical Computer Science. An EATCS Series)
Modelling Distributed Systems (Texts in Theoretical Computer Science. An EATCS Series)
A distributed system is driven by separate components that are executed in parallel, and protocols for such systems form a major aspect of system design in todays world of wireless and mobile networking. Process algebras are languages for the description of elementary parallel systems and are used to study the behavioural properties of distributed...
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy