Home | Amazing | Today | Tags | Publishers | Years | Search 
Microengineering of Metals and Ceramics: Part I: Design, Tooling, and Injection Molding (Advanced Micro and Nanosystems)
Microengineering of Metals and Ceramics: Part I: Design, Tooling, and Injection Molding (Advanced Micro and Nanosystems)
Microstructures, electronics, nanotechnology - these vast fields of research are growing together as the size gap narrows and many different materials are combined. Current research, engineering sucesses and newly commercialized products hint at the immense innovative potentials and future applications that open up once mankind controls shape and...
Microsoft Voice and Unified Communications
Microsoft Voice and Unified Communications

The telecommunications industry is changing in ways not thought possible. We, as a human race, are seeing a complete transformation in how human communication can be used throughout applications and devices, truly connecting people and processes, regardless of geography, at a speed of innovation that is incomprehensible. The future of these...

Algorithms for VLSI Physical Design Automation, Third Edition
Algorithms for VLSI Physical Design Automation, Third Edition
Algorithms for VLSI Physical Design Automation, Third Edition covers all aspects of physical design. The book is a core reference for graduate students and CAD professionals. For students, concepts and algorithms are presented in an intuitive manner. For CAD professionals, the material presents a balance of theory and practice. An extensive...
Story Circle: Digital Storytelling Around the World
Story Circle: Digital Storytelling Around the World
Everyone loves a story. Not everyone loves a computer. ‘Digital storytelling’ is a workshop-based practice in which people are taught to use digital media to create short audio-video stories, usually about their own lives, placing the universal human delight in narrative and self expression into the hands of everyone, bringing a...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

An Introduction to the Physics of High Energy Accelerators (Wiley Series in Beam Physics and Accelerator Technology)
An Introduction to the Physics of High Energy Accelerators (Wiley Series in Beam Physics and Accelerator Technology)
More than 50 years ago the discovery and understanding of radiation led to the idea of a beam of elementary particles. Since then the development of processes for the collection, focusing, and acceleration of such beams has given rise to a growing number of facilities designed to produce a variety of particle beams for a multitude of purposes....
Marketing to the Social Web: How Digital Customer Communities Build Your Business
Marketing to the Social Web: How Digital Customer Communities Build Your Business

An updated and expanded Second Edition of the popular guide to social media for the business community

Marketers must look to the Web for new ways of finding customers and communicating with them, rather than at them. From Facebook and YouTube to blogs and Twitter-ing, social media on the Internet is the most promising new way to...

Knowledge Governance: Processes and Perspectives
Knowledge Governance: Processes and Perspectives
While there are many books on knowledge management, knowledge governance is a concept that has not been so well explored, and is much less understood. Knowledge governance refers to choosing structures and mechanisms that can influence the processes of sharing and creating knowledge.

The book argues that knowledge governance is a
...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
3D Game Programming All in One
3D Game Programming All in One
Are you an aspiring game developer with a great idea, but no practical knowledge for turning that idea into reality? 3D Game Programming All in One is the comprehensive guide you need! This new edition updates the original coverage with the latest version of Torque from GarageGames, and provides the very best tools available to the Indie game...
Modular Web Design: Creating Reusable Components for User Experience Design and Documentation
Modular Web Design: Creating Reusable Components for User Experience Design and Documentation
User experience design teams often suffer from a decentralized, blank canvas approach to creating and documenting a design solution for each new project. As teams repeatedly reinvent screen designs, inconsistency results, and IT teams scramble to pick up the pieces. Pattern libraries only go so far, suggesting general solutions to common problems...
Knowledge Discovery from Sensor Data (Industrial Innovation)
Knowledge Discovery from Sensor Data (Industrial Innovation)
Addressing the issues challenging the sensor community, this book presents innovative solutions in offline data mining and real-time analysis of sensor or geographically distributed data. Illustrated with case studies, it discusses the challenges and requirements for sensor data-based knowledge discovery solutions in high-priority application. The...
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy