Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Enduring Library: Technology, Tradition, and the Quest for Balance
The Enduring Library: Technology, Tradition, and the Quest for Balance
George Eliot’s Middlemarch, deemed by many the finest English-language novel of the nineteenth century, is rooted in a particular time and place. The time is the late 1820s and early 1830s and the place England—a country going through a profound change. Superstition was giving way to science, quackery to scientific medicine,...
Digital Synthesizers and Transmitters for Software Radio
Digital Synthesizers and Transmitters for Software Radio
The approach adopted in this book will, it is hoped, provide an understanding
of key areas in the field of digital synthesizers and transmitters. It is easy
to include different digital techniques in the digital synthesizers and transmitters
by using digital signal processing methods, because the signal is in
digital form. By
...
The Dark Side of Game Texturing
The Dark Side of Game Texturing

A perfect and direct starting point for a beginner game texture artist! "The Dark Side of Game Texturing" is also an excellent reference for intermediate artists, or for those who want to further their digital art skills. Learn how to create game textures similar to the eerie, sinister, and ominous textures seen in great video games...

Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Microsoft SharePoint: Building Office 2007 Solutions in C# 2005 (Expert's Voice in Sharepoint)
Microsoft SharePoint: Building Office 2007 Solutions in C# 2005 (Expert's Voice in Sharepoint)
Microsoft SharePoint: Building Office 2007 Solutions in C# 2005 is the third edition of Scot Hillier's market-leading SharePoint book. This book features extensive updates to the previous edition, with a complete focus on SharePoint 2007 and its integration with the 2007 Microsoft Office System. It also features new approaches for using...
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings (Lecture Notes in Computer Science)
Social Computing, Behavioral-Cultural Modeling and Prediction: 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions....

Bion in New York and Sao Paulo: And Three Tavistock Seminars
Bion in New York and Sao Paulo: And Three Tavistock Seminars

These two talks given in 1977 and 1978 in New York and Sao Paulo respectively are an edited version of discussions and spontaneous contributions made by Bion, in the main without notes. This is a new 2019 edition, edited and introduced by Meg Harris Williams.

Wilfred Ruprecht Bion (1897–1979) was born in India in the days...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Cyberthreats: The Emerging Fault Lines of the Nation State
Cyberthreats: The Emerging Fault Lines of the Nation State

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy