Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Neurocriminology: Forensic and Legal Applications, Public Policy Implications
Neurocriminology: Forensic and Legal Applications, Public Policy Implications

Neurocriminology: Forensic and Legal Applications, Public Policy Implications explores the dramatic impact of advances in neuroscience research and practice to our present understanding of criminality and crime control. Contemporary, cutting-edge research in neuroscience is cited and explained. Studies and cases are clearly...

Building the Perfect PC
Building the Perfect PC
This popular Build-It-Yourself (BIY) PC book covers everything you want to know about building your own system: Planning and picking out the right components, step-by-step instructions for assembling your perfect PC, and an insightful discussion of why you'd want to do it in the first place. Most big brand computers from HP, Dell and others use...
Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...
Cyberpolitics in International Relations (MIT Press)
Cyberpolitics in International Relations (MIT Press)

Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics -- background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics -- national security, core...

The AI Business: The Commercial Uses of Artificial Intelligence
The AI Business: The Commercial Uses of Artificial Intelligence

What is the bottom line on Artificial Intelligence? The AI Business offers a comprehensive summary of the commercial picture, present and future, for Artificial Intelligence in the computer industry, medicine, the oil industry, and electronic design. AI's brightest and best - financiers, researchers, and users - analyze current...

Internet Core Protocols: The Definitive Guide
Internet Core Protocols: The Definitive Guide
For network administrators, support professionals, and system designers, intimate knowledge of the network protocols that are the foundation of the Internet is crucial. Internet Core Protocols: The Definitive Guide is a superb summary of the nitty-gritty details of the most important Net standards.

This book assumes you have a working...

A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

The VLSI Handbook, Second Edition (Electrical Engineering Handbook)
The VLSI Handbook, Second Edition (Electrical Engineering Handbook)
We are most gratified to find that the first edition of The VLSI Handbook (2000) was well received and is widely used. Thus, we feel that our original goal of providing in-depth professional-level coverage of VLSI technology was, indeed, worthwhile. Seven years is a short time in terms of development of science and technology; however as this...
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
RF Microelectronics (Communications Engineering and Emerging Technologies Series)
The annual worldwide sales of cellular phones has exceeded $2.5B. With 4.5 million customers, home satellite networks comprise a $2.5B industry. The global positioning system is expected to become a $5B market by the year 2000. In Europe, the sales of equipment and services for mobile communications will reach $30B by 1998. The statistics are...
Java Closures and Lambda
Java Closures and Lambda
This book is the culmination of many brash years and hard lessons. The story starts all the way back when I migrated from C++ into perl. The perl programming language was amazingly powerful compared to the low-level manipulations and bookkeeping of C++. (The fact that it was “slow” never bothered me – I would rather write...
The Dream Team Nightmare: Boost Team Productivity Using Agile Techniques
The Dream Team Nightmare: Boost Team Productivity Using Agile Techniques

This first-ever interactive Agile Adventure is the gripping tale of an experienced team struggling with agile adoption. In this unique mashup of a business novel written in the gamebook format, you'll overcome common yet daunting challenges that come from using agile methods. As Jim, the agile coach, you'll learn to apply a range of...

Computational Geometry: Algorithms and Applications, Second Edition
Computational Geometry: Algorithms and Applications, Second Edition
This well-accepted introduction to computational geometry is a textbook for high-level undergraduate and low-level graduate courses. The focus is on algorithms and hence the book is well suited for students in computer science and engineering. Motivation is provided from the application areas: all solutions and techniques from computational...
unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy