Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem
Scientific Foundations of Crime Scene Reconstruction: Introducing Method to Mayhem

Philosophers of science have long used reconstructive reasoning to develop historical explanations covering the origins of natural phenomenon. The application of the scientific method is a powerful tool for solving crimes through reconstruction of the events. Scientific Foundations of Crime Scene Reconstruction: Introducing Method to...

Guide to Medical Image Analysis: Methods and Algorithms (Advances in Computer Vision and Pattern Recognition)
Guide to Medical Image Analysis: Methods and Algorithms (Advances in Computer Vision and Pattern Recognition)
This book presents a comprehensive overview of medical image analysis. Practical in approach, the text is uniquely structured by potential applications. Features: presents learning objectives, exercises and concluding remarks in each chapter, in addition to a glossary of abbreviations; describes a range of common imaging techniques,...
Theory and Methods of Quantification Design on System-Level Electromagnetic Compatibility
Theory and Methods of Quantification Design on System-Level Electromagnetic Compatibility
This book systematically explains the fundamentals of system-level electromagnetic compatibility and introduces the basic concept of system-level electromagnetic compatibility quantification design. The topics covered include the critical technologies in the top-down quantification design of electromagnetic compatibility, quantification...
Managing Successful Projects with PRINCE2 2009 Edition Manual
Managing Successful Projects with PRINCE2 2009 Edition Manual

This publication provides a universally applicable project management method - the principles, processes and techniques that enable individuals and organisations to successfully deliver their projects within time, cost and quality constraints. Managing Successful Projects with PRINCE2 forms part of a pair of publications that are the result...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Network Congestion Control: Managing Internet Traffic (Wiley Series on Communications Networking & Distributed Systems)
Network Congestion Control: Managing Internet Traffic (Wiley Series on Communications Networking & Distributed Systems)
As the Internet becomes increasingly heterogeneous, the issue of congestion control becomes ever more important.

In order to maintain good network performance, mechanisms must be provided to prevent the network from being congested for any significant period of time. Michael Welzl describes the background and concepts of...

e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
e-Business and Telecommunications: 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009.
The present book includes extended and revised versions of a set of selected best papers from the 6th International Joint Conference on e-Business and Telecommunications (ICETE), which was held in July 2009, in Milan, Italy. This conference reflects a continuing effort to increase the dissemination of recent research results...
Mind Over Markets: Power Trading with Market Generated Information, Updated Edition
Mind Over Markets: Power Trading with Market Generated Information, Updated Edition

A timely update to the book on using the Market Profile method to trade

Emerging over twenty years ago, Market Profile analysis continues to realize a strong following among active traders. The approach explains the underlying dynamics and structure of markets, identifies value areas, price rejection points, and...

State Space Grids: Depicting Dynamics Across Development
State Space Grids: Depicting Dynamics Across Development

Human development from birth through adulthood is a complex interplay of many interacting forces. Children’s internal processes are manifest in behaviors that are sculpted by their experiences, most notably with primary caregivers. Because the discipline of psychology explores human behavior and cognition, the techniques employed for...

VALU, AVX and GPU Acceleration Techniques for Parallel FDTD Methods
VALU, AVX and GPU Acceleration Techniques for Parallel FDTD Methods

This book introduces a general hardware acceleration technique that can significantly speed up finite difference time domain (FDTD) simulations and their applications to engineering problems without requiring any additional hardware devices. It provides detailed code demonstration and analysis to help readers get the step-by-step guidelines...

Carpal Tunnel Syndrome
Carpal Tunnel Syndrome
Carpal tunnel syndrome is the most common hand problem, affecting as much as 5% of the adult population; yet in the large majority of cases, the condition is idiopathic. While surgical treatment often results in improvement, residual loss of function and some persistence of symptoms are common. Clinicians still disagree as to...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

unlimited object storage image
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy