 |
|
 Website Optimization: Speed, Search Engine & Conversion Rate SecretsRemember when an optimized website was one that merely didn't take all day to appear? Times have changed. Today, website optimization can spell the difference between enterprise success and failure, and it takes a lot more know-how to achieve success.
This book is a comprehensive guide to the tips, techniques, secrets, standards, and methods... |  |  Remote Sensing, Third Edition: Models and Methods for Image ProcessingWith nearly ten years since publication of the Second Edition of Remote Sensing - Models and Methods for Image Processing , the Third Edition provides a needed and comprehensive update.
The changes include:
• Sensor updates, including the NASA satellites Terra, Aqua, and EO-1, and the commercial satellites IKONOS,... |  |  |
|
|
 Hubble: 15 Years of DiscoveryHubble: 15 Years of Discovery forms a key element of the European Space Agency's 15th anniversary celebration activities for the 1990 launch of the NASA/ESA Hubble Space Telescope.
As an observatory in space, Hubble is one of the most successful scientific projects of all time, both in terms of scientific output and its... |  |  Reflectarray AntennasDescribes the configuration and principles of a reflectarray antenna, its advantages over other antennas, the history of its development, analysis techniques, practical design procedures, bandwidth issues and wideband techniques, as well as applications and recent developments. Both authors are well respected practitioners who have build these... |  |  The Volcano Adventure GuideThe Volcano Adventure Guide is the first book of its type. It contains vital information for anyone wishing to visit, explore, and photograph active volcanoes safely and enjoyably. Following an introduction that discusses eruption styles of different types of volcanoes, how to prepare for a volcano trip, and how to avoid volcanic dangers, the book... |
|
 Computer Forensics: Computer Crime Scene Investigation (Networking Series)The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package... |  |  Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... |  |  Astrophysical Lasers`A book of great educational value for graduate students and professional astronomers. ' Professor Dame Carole Jordan, University of Oxford
Progress in modern radio astronomy led to the discovery of space masers in the microwave range, and it became a powerful tool for studies of interstellar star-forming molecular... |
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |