Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Contemporary High Performance Computing: From Petascale toward Exascale
Contemporary High Performance Computing: From Petascale toward Exascale

Contemporary High Performance Computing: From Petascale toward Exascale focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors.

...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Building Web Applications With SAS/IntrNet: A Guide to the Application Dispatcher (SAS Press)
Building Web Applications With SAS/IntrNet: A Guide to the Application Dispatcher (SAS Press)
Learn how you can save countless hours of research and development time building your Web applications with the SAS/IntrNet Application Dispatcher. Author Don Henderson illustrates the multitude of features and capabilities available in the SAS/IntrNet Application Dispatcher and shows you how to take better advantage of these tools to make your...
6 Secrets to Startup Success: How to Turn Your Entrepreneurial Passion into a Thriving Business
6 Secrets to Startup Success: How to Turn Your Entrepreneurial Passion into a Thriving Business
You have always dreamed of skydiving, imagining yourself in a free fall, high above the earth, parachute ready to open with the pull of a rip cord.

One day you decide to give it a try. You drive to the local airport and quickly spot the skydiving center at the edge of a wide airfield, far across a parking lot
...
Tcl and the Tk Toolkit
Tcl and the Tk Toolkit

The Tcl scripting language and the Tk toolkit - a programming environment for creating graphical user interfaces under X Windows - together represent one of the most exciting innovations in X Window System programming. Because Tcl and Tk are so easy to learn, extremely powerful, and contain so many sophisticated features, they have dramatically...

Field Confirmation Testing for Suspicious Substances
Field Confirmation Testing for Suspicious Substances
Frequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified. But law enforcement and other first responders cannot take this claim at face value, as the accuracy is not confirmed and must be verified. A comprehensive handbook for...
Practical Guide to Hydrogenated Nitrile Butadiene Rubber Technology
Practical Guide to Hydrogenated Nitrile Butadiene Rubber Technology

Hydrogenated Nitrile Butadiene Rubber (HNBR) is a synthetic polymer that results from the hydrogenation of Nitrile Rubber (NBR). It is widely known for its physical strength and retention of properties after long-term exposure to heat, oil and chemicals. The unique properties attributed to it have resulted in wide adoption of HNBR in...

Circuit Analysis II With Matlab Applications
Circuit Analysis II With Matlab Applications

This text is written for use in a second course in circuit analysis. The reader of this book should have the traditional undergraduate knowledge of an introductory circuit analysis material such as Circuit Analysis I with MATLAB® Applications by this author. Another prerequisite would be knowledge of differential equations, and in most...

Back Pain in the Young Child and Adolescent: A Case-Based Guide
Back Pain in the Young Child and Adolescent: A Case-Based Guide

Back pain is a common musculoskeletal condition that presents to physicians in the primary care office, the urgent care facility, and the emergency room. However, few  primary care physicians have received education and training about the appropriate workup and referral for a child who presents with back pain. This book is...

CodeIgniter Web Application Blueprints
CodeIgniter Web Application Blueprints

Develop full-featured dynamic web applications using the powerful CodeIgniter MVC framework

About This Book

  • Create your own dynamic web application using wireframes, databases, and language files
  • Develop unique applications to perform simple tasks, such as authorizing users, sharing...
Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection: Prevention versus Mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years....

Mac OS X Panther Unleashed (3rd Edition)
Mac OS X Panther Unleashed (3rd Edition)
Underneath the colorful interface of Mac OS X is a powerful, complicated operating system based on BSD Unix. And, Mac users of all kinds continue to need help both in figuring out how to run OS X and in understanding how OS X works underneath the covers as well as how to get the most out it. In late summer 2003 Apple is expected to release a new...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy