Home | Amazing | Today | Tags | Publishers | Years | Search 
Computational and Instrumental Methods in EPR (Biological Magnetic Resonance)
Computational and Instrumental Methods in EPR (Biological Magnetic Resonance)

Electron magnetic resonance in the time domain has been greatly facilitated by the introduction of novel resonance structures and better computational tools, such as the increasingly widespread use of density-matrix formalism. This second volume in our series, devoted both to instrumentation and computation, addresses applications and...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)
Microsoft SharePoint 2010 Administration: Real World Skills for MCITP Certification and Beyond (Exam 70-668)

SharePoint 2010 is a complex product, and a diverse skill set is required to administer it. You have to be part database administrator (DBA), part web developer, part network administrator, and part server administrator to fully wrap your mind around this product. This book was written to help you do just that.

...
Programming with POSIX® Threads
Programming with POSIX® Threads

This book is about "threads" and how to use them. Thread" is just a name for a basic software "thing" that can do work on a computer. A thread is smaller, faster, and more maneuverable than a traditional process. In fact, once threads have been added to an operating system, a "process" becomes just...

Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

HTML5 Multimedia Development Cookbook
HTML5 Multimedia Development Cookbook

Maybe you've heard the story—or probably urban legend—about the university that didn't lay any grass or pour any concrete when it first opened, leaving the campus grounds as solid dirt. Then, as students began to traverse the campus from one class to the next, campus planners mapped the common paths they took, and then...

Design of Systems on a Chip: Design and Test
Design of Systems on a Chip: Design and Test

This book is the second of two volumes addressing the design challenges associated with new generations of semiconductor technology. The various chapters are compiled from tutorials presented at workshops in recent years by prominent authors from all over the world. Technology, productivity and quality are the main aspects under consideration...

Algorithms in Bioinformatics
Algorithms in Bioinformatics

The present volume is dedicated to aspects of algorithmic work in bioinformat ics and computational biology with an emphasis on string algorithms that play a central role in the analysis of biological sequences. The papers included are a selection of articles corresponding to talks given at one of two meetings spon sored by The Royal...

Adobe Dreamweaver CS5.5 Studio Techniques: Designing and Developing for Mobile with jQuery, HTML5, and CSS3
Adobe Dreamweaver CS5.5 Studio Techniques: Designing and Developing for Mobile with jQuery, HTML5, and CSS3

Don’t be fooled. Although the .5 might give the impression that Dreamweaver CS5.5 is a point release, it’s anything but. Dreamweaver engineers have packed a stunning amount of new features into this version. To mention just a few, there’s code hinting for the popular jQuery JavaScript library, the ability to see what pages...

Pentaho Kettle Solutions: Building Open Source ETL Solutions with Pentaho Data Integration
Pentaho Kettle Solutions: Building Open Source ETL Solutions with Pentaho Data Integration

A complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL

This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you’re a database administrator or developer, you’ll first get up to speed on Kettle basics and how to apply Kettle to create ETL...

Result Page: 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy