Home | Amazing | Today | Tags | Publishers | Years | Search 
Analysis of Biological Networks (Wiley Series in Bioinformatics)
Analysis of Biological Networks (Wiley Series in Bioinformatics)
An introduction to biological networks and methods for their analysis

Analysis of Biological Networks is the first book of its kind to provide readers with a comprehensive introduction to the structural analysis of biological networks at the interface of biology and computer science. The book begins with a brief overview of biological networks...

Windows Server 2008 Unleashed
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows...
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

"Ron Goldman is a leading expert who knows the fundamental concepts and their interconnectedness, as well as the small details. The elegance of the writing and of the methods used to present the material allows us to get a deep understanding of the central concepts of CAGD. In its simplicity and pure beauty, the theory indeed resembles the...

ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Mac OS X Leopard: The Missing Manual
Mac OS X Leopard: The Missing Manual
With Leopard, Apple has unleashed the greatest version of Mac OS X yet, and David Pogue is back with another meticulous Missing Manual to cover the operating system with a wealth of detail. The new Mac OS X 10.5, better known as Leopard, is faster than its predecessors, but nothing's too fast for Pogue and this Missing Manual. It's just one of...
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Mathematical Methods for Physics and Engineering: A Comprehensive Guide
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
From reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best...
Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

Automated Defect Prevention: Best Practices in Software Management
Automated Defect Prevention: Best Practices in Software Management
Improve Productivity by Integrating Automation and Defect Prevention into Your Software Development Process

This book presents an approach to software management based on a new methodology called Automated Defect Prevention (ADP). The authors describe how to establish an infrastructure that functions as a software "production line"...

Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer
Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer
We dance around in a circle and suppose, while the secret sits in the middle and knows. (Frost, 1971)

It is the laborious life of scientific research that requires us to continually presume, then find support for our presumptions, which either stand the test of time or fall prey to falsifying evidence only to be replaced by new ideas and
...
Bridging the Culture Gap: A Practical Guide to International Business Communication
Bridging the Culture Gap: A Practical Guide to International Business Communication

As globalization gathers momentum, contact between business people from other countries is becoming more frequent. The more national boundaries a company crosses, the greater the scope for misunderstanding and conflict. To succeed internationally, it is essential to be able to break the barriers of culture, language, and set patterns of...

Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy