Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Molecular Basis of Thyroid Cancer (Cancer Treatment and Research)
Molecular Basis of Thyroid Cancer (Cancer Treatment and Research)
Thyroid cancer is the fastest growing cancer in the U.S., especially among women. Given the relative success we have had in its treatment, there is a need to capitalize on it by better understanding the factors that underpin this malignancy, and exploring better strategies for diagnosis, treatment, and follow-up. To do so, we must...
Principles of Molecular Cardiology (Contemporary Cardiology)
Principles of Molecular Cardiology (Contemporary Cardiology)

An easy-to-read survey of all the latest developments in molecular cardiologic research and therapy. The authors explain in a readable style the complex process of the heart's development, the molecular basis of cardiovascular diseases, and the translation of these research advances to actual clinical treatments. The expert information...

iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7
iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7

Printed in full color.

A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to
...

Natural Language Processing and Computational Linguistics: A practical guide to text analysis with Python, Gensim, spaCy, and Keras
Natural Language Processing and Computational Linguistics: A practical guide to text analysis with Python, Gensim, spaCy, and Keras

Work with Python and powerful open source tools such as Gensim and spaCy to perform modern text analysis, natural language processing, and computational linguistics algorithms.

Key Features

  • Discover the open source Python text analysis ecosystem, using spaCy, Gensim, scikit-learn, and...
Theoretical Thermotics: Transformation Thermotics and Extended Theories for Thermal Metamaterials
Theoretical Thermotics: Transformation Thermotics and Extended Theories for Thermal Metamaterials
This book focuses on theoretical thermotics, the theory of transformation thermotics and its extended theories for the active control of macroscopic thermal phenomena of artificial systems, which is in sharp contrast to classical thermodynamics comprising the four thermodynamic laws for the passive description of macroscopic thermal phenomena of...
Handbook of Popular Culture and Biomedicine: Knowledge in the Life Sciences as Cultural Artefact
Handbook of Popular Culture and Biomedicine: Knowledge in the Life Sciences as Cultural Artefact

This handbook explores the ways biomedicine and pop culture interact while simultaneously introducing the reader with the tools and ideas behind this new field of enquiry. From comic books to health professionals, from the arts to genetics, from sci-fi to medical education, from TV series to ethics, it offers different...

Python Pocket Reference, 2nd Edition
Python Pocket Reference, 2nd Edition
This pocket reference covers the latest Python release 2.2. It is a short, concise reference for the Python programming language, and its most commonly used libraries and tools. Designed to be a quick and easy to use resource for developers, this book serves as a natural companion to O'Reilly's Learning Python and...
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)
Artificial Mind System: Kernel Memory Approach (Studies in Computational Intelligence)

This book is written from an engineer's perspective of the mind. "Artificial Mind System" exposes the reader to a broad spectrum of interesting areas in general brain science and mind-oriented studies. In this research monograph a picture of the holistic model of an artificial mind system and its behaviour is drawn, as concretely as...

Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

unlimited object storage image
Result Page: 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy