 |
|
 Data Visualization: a successful design process
This book will benefit anyone who wants to discover effective, attractive ways to visually analyze and communicate data. With no special knowledge required, it's an inspirational guide that teaches through examples and illustration.
-
A portable, versatile and flexible data visualization design approach that will help...
|  |  An Introduction to Object-Oriented Programming with Visual Basic .NET
As you work your way through An Introduction to Object-Oriented Programming with Visual Basic .NET, you'll learn how to analyze the business requirements of an application, model the objects and relationships involved in the solution design and, finally, implement the solution using Visual Basic .NET. Along the way you'll also... |  |  Numerical Methods using MATLAB
Numerical Methods with MATLAB provides a highly-practical reference work to assist anyone working with numerical methods. A wide range of techniques are introduced, their merits discussed and fully working MATLAB code samples supplied to demonstrate how they can be coded and applied.
... |
|
|
|
 The Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward... |  |  Placebo and Pain: From Bench to Bedside
The placebo effect continues to fascinate scientists, scholars, and clinicians, resulting in an impressive amount of research, mainly in the field of pain. While recent experimental and clinical studies have unraveled salient aspects of the neurobiological substrates and clinical relevance of pain and placebo analgesia, an authoritative... |  |  Using Event-B for Critical Device Software Systems
Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).
This is assessed... |
|
| Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |