Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cambridge Handbook of Information and Computer Ethics
The Cambridge Handbook of Information and Computer Ethics

Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...

Ant Colony Optimization (Bradford Books)
Ant Colony Optimization (Bradford Books)

The complex social behaviors of ants have been much studied by science, and computer scientists are now finding that these behavior patterns can provide models for solving difficult combinatorial optimization problems. The attempt to develop algorithms inspired by one aspect of ant behavior, the ability to find what computer scientists would...

Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Science in the Age of Computer Simulation
Science in the Age of Computer Simulation

Computer simulation was first pioneered as a scientific tool in meteorology and nuclear physics in the period following World War II, but it has grown rapidly to become indispensible in a wide variety of scientific disciplines, including astrophysics, high-energy physics, climate science, engineering, ecology, and economics. Digital computer...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Computer Aided And Integrated Manufacturing Systems, Volume 5: Manufacturing Processes
Computer Aided And Integrated Manufacturing Systems, Volume 5: Manufacturing Processes

This is an invaluable five-volume reference on the very broad and highly significant subject of computer aided and integrated manufacturing systems. It is a set of distinctly titled and well-harmonized volumes by leading experts on the international scene.

The techniques and technologies used in computer aided and integrated...

Using Microsoft Access 2010
Using Microsoft Access 2010

This book is for anyone comfortable using a personal computer who needs to collect and manipulate information. Experience with Microsoft Access 2010 or an earlier version of Access is helpful, but not necessary. The book takes the user from the basic techniques on how to use Microsoft Access 2010 to a strong...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

Samsung Galaxy Tab 10.1 For Dummies
Samsung Galaxy Tab 10.1 For Dummies

It’s not a cell phone. It’s not a computer. It’s the latest craze: the tablet. It

exists somewhere between the traditional computer and the newfangled smart phone. That makes the tablet kind of an oddball, but quite a popular oddball.

The Galaxy Tab is Samsung’s solution to your mobile,
...
Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Rapid BeagleBoard Prototyping with MATLAB and Simulink
Rapid BeagleBoard Prototyping with MATLAB and Simulink

Leverage the power of BeagleBoard to develop and deploy practical embedded projects

Overview

  • Develop and validate your own embedded audio/video applications rapidly with Beagleboard
  • Create embedded Linux applications on a pure Windows PC
  • Full of illustrations, diagrams, and...
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

unlimited object storage image
Result Page: 799 798 797 796 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy