Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition
Chemical Warfare Agents: Chemistry, Pharmacology, Toxicology, and Therapeutics, Second Edition

The first edition of this book, Chemical Warfare Agents: Toxicity at Low Levels, was published just prior to the terrorist attacks of September 11th, 2001. Reflecting a greater sense of urgency within the field of chemical defense since this event, research related to chemical warfare agents (CWAs) continues to expand at a remarkable...

BeagleBone Home Automation
BeagleBone Home Automation

The Internet of Things is now being taken up by tech corporations but this fantastic book brings you the DIY approach to home automation using BeagleBone. From dimming the lights to opening the garage door -- it's all here.

Overview

  • Practical approach to home automation using BeagleBone; starting from...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Hidden Treasures in Contemporary RNA Sequencing (SpringerBriefs in Computer Science)
Hidden Treasures in Contemporary RNA Sequencing (SpringerBriefs in Computer Science)
Advances in RNA-sequencing (RNA-seq) technologies have provided an unprecedented opportunity to explore the gene expression landscape across individuals, tissues, and environments by efficiently profiling the RNA sequences present in the samples. When a reference genome sequence or a transcriptome of the sample is available,...
The Great Telecom Meltdown
The Great Telecom Meltdown
The economic boom of the late 1990s included huge investments in the telecommunications
industry and related sectors. It was followed by a downturn of
unusual severity, which reduced total paper wealth by trillions of dollars, cost
many thousands of jobs, and saw some of the biggest bankruptcies in history.
While there certainly
...
Speed!: Understanding and Installing Home Networks (Sams Other)
Speed!: Understanding and Installing Home Networks (Sams Other)
This book is more than a guide. It is a valuable reference that is written in plain, non-technical language so readers can put the information to use straightaway. There are descriptions of the latest technologies, protocols, services, and software packages. The reader will unearth methods on how to create an economical and secure network for...
Building Parallel, Embedded, and Real-Time Applications with Ada
Building Parallel, Embedded, and Real-Time Applications with Ada

The arrival and popularity of multi-core processors have sparked a renewed interest in the development of parallel programs. Similarly, the availability of low cost microprocessors and sensors has generated a great interest in embedded real-time programs. This book provides students and programmers with traditional backgrounds in...

Reichman and Hershfield's Tuberculosis: A Comprehensive, International Approach (Lung Biology in Health and Disease)
Reichman and Hershfield's Tuberculosis: A Comprehensive, International Approach (Lung Biology in Health and Disease)

Thoroughly examining tuberculosis from historical, theoretical, and clinical perspectives, this Third Edition merges state-of-the-art research developments with principles of programmatic TB management. Each of the 50 chapters analyze current studies on TB mechanisms and treatment and will meet the needs of all who work in the field of TB...

From Secret Ballot to Democracy Sausage: How Australia Got Compulsory Voting
From Secret Ballot to Democracy Sausage: How Australia Got Compulsory Voting
NOT MANY COUNTRIES compel their citizens to vote, but Australia is one. Voting is compulsory in nineteen of the world’s 166 electoral democracies and only nine strictly enforce it.

None of Europe’s most influential democracies has it, and none of the countries in the mainstream of Australia’s
...
FPGA Implementations of Neural Networks
FPGA Implementations of Neural Networks

The development of neural networks has now reached the stage where they are employed in a large variety of practical contexts. However, to date the majority of such implementations have been in software. While it is generally recognised that hardware implementations could, through performance advantages, greatly increase the use of neural...

Design Accessible Web Sites: 36 Keys to Creating Content for All Audiences and Platforms
Design Accessible Web Sites: 36 Keys to Creating Content for All Audiences and Platforms
It was a dark and stormy night...

Actually, It was a late summer afternoon a little over ten years ago when I first began to get accessibility. Back then, I was working as a student web developer and sysadmin and we needed a system for a blind user to work on a paper. Simple enough—we had some new systems. Just grab one, install
...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy