Home | Amazing | Today | Tags | Publishers | Years | Search 
Dynamic Electrocardiography
Dynamic Electrocardiography
Compared to many clinical methods and procedures, electrocardiography is not particularly new. The first human electrocardiogram was recorded by Dr Augustus Desiré Waller in 1887. Since that time, the development of electrocardiography was not uniform. Several waves of advancement of the physiologic understanding...
SAS/STAT 9.2 User's Guide: Statistical Graphics Using ODS (Book Excerpt)
SAS/STAT 9.2 User's Guide: Statistical Graphics Using ODS (Book Excerpt)
Effective graphics are indispensable for modern statistical analysis. They reveal patterns, differences, and uncertainty that are not readily apparent in tabular output. Graphics provoke questions that stimulate deeper investigation, and they add visual clarity and rich content to reports and presentations.

In earlier
...
Microscale Diagnostic Techniques
Microscale Diagnostic Techniques
The fields of micro- and nanotechnology have emerged over the past decade as a major focus of modern scientific and engineering research and technology. Driven by advances in microfabrication, the investigation, manipulation and engineering of systems characterized by micrometer and, more recently, nanometer scales has become...
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Introducing HTML5 (2nd Edition)
Introducing HTML5 (2nd Edition)

Welcome to the second edition of the Remy & Bruce show. Since the first edition of this book came out in July 2010, much has changed: support for HTML5 is much more widespread; Internet Explorer 9 finally came out; Google Chrome announced it would drop support for H.264 video; Opera experimented with video streaming...

Failed Stone
Failed Stone
In the spring of 2002, I wrote a book entitled Falling Glass: Problems and Solutions in Contemporary Architecture. The research for Falling Glass helped me understand how glass failures could be avoided and enlightened me as to which innovations were being explored within the glass industry. Originally, the book was...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
In recent years, federal oversight of public expenditures has sought to integrate performance and budgeting. Notably, the Government Performance and Results Act (GPRA) was passed in 1993 “in response to questions about the value and effectiveness of federal programs” (GAO, 1997, p. 11). GPRA and other mandates...
An Introduction to Trading in the Financial Markets SET: An Introduction to Trading in the Financial Markets: Technology: Systems, Data, and Networks
An Introduction to Trading in the Financial Markets SET: An Introduction to Trading in the Financial Markets: Technology: Systems, Data, and Networks

This book is the third in a set of books that address the trading markets. We use the term “trading markets” because that is the most general term we can find for the portion of the financial markets sometimes imprecisely referred to as the securities markets. (We explained these distinctions in Book 1, An Introduction to Trading...

Handbook of Differential Equations: Stationary Partial Differential Equations, Volume 6
Handbook of Differential Equations: Stationary Partial Differential Equations, Volume 6

This is a survey on elliptic boundary value problems on varying domains and tools needed for that. Such problems arise in numerical analysis, in shape optimisation  problems and in the investigation of the solution structure of nonlinear elliptic equations. The methods are also useful to obtain certain results for equations on non-smooth...

California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)

Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy