Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Glow Discharge Plasmas in Analytical Spectroscopy
Glow Discharge Plasmas in Analytical Spectroscopy

This multi-author, edited volume includes chapters which deal with both basic and highly complex applications. Glow discharge devices are now being used in very novel ways for the analysis of liquids and gases, including molecular species detection and identification, an area that was beyond the perceived scope of applicability just ten years...

Community Building on the Web : Secret Strategies for Successful Online Communities
Community Building on the Web : Secret Strategies for Successful Online Communities
There's been a marked shift in the philosophy of developing successful Web sites. The technologies (HTML, JavaScript, JavaServer Pages) no longer occupy center stage. Rather, functional objectives and the communities that grow up around them seem to be the main ingredient in Web site success. In her carefully reasoned and well-written Community...
Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Cisco IP Routing Protocols: Troubleshooting Techniques
Cisco IP Routing Protocols: Troubleshooting Techniques

Cisco IP Routing Protocols: Troubleshooting Techniques is a comprehensive reference guide for network professionals facing problems with implementing and configuring IP routing protocols. It begins with an explanation of troubleshooting methodologies and tools, including Cisco and TCP/IP diagnostic commands and basic protocol...

Knowledge Integration: The Practice of Knowledge Management in Small and Medium Enterprises
Knowledge Integration: The Practice of Knowledge Management in Small and Medium Enterprises
The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because, as opposed to large companies, they have limited internal knowledge resources and little power to control...
Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Engineering and Managing Software Requirements
Engineering and Managing Software Requirements
Requirements engineering is the process by which the requirements for software systems are gathered, analyzed, documented, and managed throughout their complete lifecycle. Traditionally it has been concerned with technical goals for, functions of, and constraints on software systems. Aurum and Wohlin, however, argue that it is no longer appropriate...
The Executive's Role in Knowledge Management
The Executive's Role in Knowledge Management
This book can act as a guide for those who grasp the potential of their organizations' knowledge assets and want to develop strategies for leveraging them.

The absolute, most critical success factor in knowledge management (KM) success is senior-level support. With a bottom-line perspective, The Executive’s role in Knowledge
...
Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Force Microscopy: Applications in Biology and Medicine
Force Microscopy: Applications in Biology and Medicine
A complete examination of the uses of the atomic force microscope in biology and medicine

This cutting-edge text, written by a team of leading experts, is the first detailed examination of the latest, most powerful scanning probe microscope, the atomic force microscope (AFM). Using the AFM, in combination with...

RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy