Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Physics of Information Technology
The Physics of Information Technology
"...throughout the text, Gershenfeld retains much of the conversational tone and spontaneity of a lecture. At its best, this makes for enjoyable reading, with interesting tidbits and asides that enliven the discussions....Gershenfeld's book will be valuable for physical scientists looking for an enjoyable introduction to the information...
Bioinformatics: An Introduction (Computational Biology)
Bioinformatics: An Introduction (Computational Biology)
Bioinformatics is interpreted as the application of information science to biology, in which it plays a fundamental and all-pervasive role. The field continues to develop intensively in both academia and commercially, and is highly interdisciplinary. This broad-ranging and thoroughly updated second edition covers new findings while retaining the...
Secrets of the JavaScript Ninja
Secrets of the JavaScript Ninja

There is nothing simple about creating effective, cross-browser, JavaScript code. In addition to the normal challenge of writing clean code you have the added complexity of dealing with obtuse browser complexities. To counter-act this JavaScript developers frequently construct some set of common, reusable, functionality in the form of...

Five Minutes on Mondays: Finding Unexpected Purpose, Peace, and Fulfillment at Work
Five Minutes on Mondays: Finding Unexpected Purpose, Peace, and Fulfillment at Work

Five Minutes on Mondays is a gold mine of enrichment…It is an easy read with a deep and profound impact.”

Martin Rutte, Chair of the Board, The Centre for Spirituality and the Workplace, Saint Mary’s University, co-author of New York Times business...

Biophysical Techniques in Photosynthesis (Advances in Photosynthesis and Respiration)
Biophysical Techniques in Photosynthesis (Advances in Photosynthesis and Respiration)
Progress in photosynthesis research is strongly dependent on instrumentation. It is therefore not surprising that the impressive advances that have been made in recent decades are paralleled by equally impressive advances in sensitivity and sophistication of physical equipment and methods. This trend started already shortly after...
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Essentials of Artificial Intelligence
Essentials of Artificial Intelligence

Since its publication, Essentials of Artificial Intelligence has been adopted at numerous universities and colleges offering introductory AI courses at the graduate and undergraduate levels. Based on the author's course at Stanford University, the book is an integrated, cohesive introduction to the field. The...

Learning Medicine
Learning Medicine

Whatever your background, whether you are a school-leaver or a mature student, if you are interested in finding out more about being a doctor, medical-school life and the details of how to get a place at medical school, this is the book for you. It has been in continuous publication since 1983 and the 17th edition has once again been...

Learning Google Apps Script
Learning Google Apps Script

Key Features

  • Gain insight into customizing and automating Google applications with JavaScript
  • Create add-ons for Google Sheets, Docs, or Forms; automate your workflow; integrate with external APIs; and more.
  • A step-by-step guide to building real-world solutions

Book...

CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
The Yellowstone grizzly population has grown from an estimated 136 bears when first granted federal protection as a threatened species to as many as 1,000 grizzlies in a tri-state region today. No longer limited to remote wilderness areas, grizzlies now roam throughout the region—in state parks, school playgrounds, residential...
unlimited object storage image
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy