Home | Amazing | Today | Tags | Publishers | Years | Search 
Psychoanalysis and Neuroscience
Psychoanalysis and Neuroscience

Recent scientific studies have brought significant advances in the understanding of basic mental functions such as memory, dreams, identification, repression, which constitute the basis of the psychoanalytical theory. This book focuses on the possibility of interactions between psychoanalysis and neuroscience: emotions and the right...

Circadian Physiology, Second Edition
Circadian Physiology, Second Edition

While the first edition of the critically acclaimed and highly popular Circadian Physiologyoffered a concise but rigorous review of basic and applied research on circadian rhythms, this newest edition provides educators with the primary textbook they need to support a course on this cutting-edge topic. Maintaining the same accessible...

Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Bioactive Components of Milk (Advances in Experimental Medicine and Biology)
Bioactive Components of Milk (Advances in Experimental Medicine and Biology)

Dairy foods have huge potential concerning functional foods. Therefore, there is a tremendous amount of interest in value-added milk products and the identification of components in food which have health benefits. This book provides an overview of these derived components and their diverse activities including: the stimulation of beneficial...

Mast Cells: Methods and Protocols (Methods in Molecular Biology)
Mast Cells: Methods and Protocols (Methods in Molecular Biology)

A cutting-edge collection of readily reproducible techniques for the isolation, culture, and study of activation and signaling in human mast cells. These methods take advantage of the latest advances in molecular biology, technology, and information science. They include methods for the identification of mast cells, the development of mast...

Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
Fungal Pathogenesis: Principles and Clinical Applications (Mycology)
Fungal Pathogenesis: Principles and Clinical Applications (Mycology)

Stresses molecular and biochemical studies of opportunistic and frank fungal pathogens!

This book gives a comprehensive overview of human pathogenic fungi that offers a current and concise survey of virulence factors, host responses and recognition, treatment and diagnosis of infections, invasive enzymes, intracellular
...

Cloud Storage Forensics
Cloud Storage Forensics

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...

State Space Consistency and Differentiability (SpringerBriefs in Optimization)
State Space Consistency and Differentiability (SpringerBriefs in Optimization)

​By investigating the properties of the natural state, this book presents an analysis of input-output systems with regard to the mathematical concept of state. The state of a system condenses the effects of past inputs to the system in a useful manner. This monograph emphasizes two main properties of the natural state; the...

Chipless RFID: Design Procedure and Detection Techniques
Chipless RFID: Design Procedure and Detection Techniques

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers...

Constrained Optimization and Optimal Control for Partial Differential Equations (International Series of Numerical Mathematics)
Constrained Optimization and Optimal Control for Partial Differential Equations (International Series of Numerical Mathematics)

This special volume focuses on optimization and control of processes governed by partial differential equations. The contributors are mostly participants of the DFG-priority program 1253: Optimization with PDE-constraints which is active since 2006. The book is organized in sections which cover almost the entire spectrum of modern research in...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy