 |
|
|
 Network Warrior
The examples used in this book are taken from my own experiences, as well as from
the experiences of those with or for whom I have had the pleasure of working. Of course,
for obvious legal and honorable reasons, the exact details and any information that
might reveal the identities of the other parties involved have been changed. ... |  |  Ecological Modeling for Resource Management
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research... |  |  Software Reliability Methods (Texts in Computer Science)
This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software... |
|
 Bionanotechnology: Lessons from Nature
Today is the most exciting time to be working in nanotechnology, and bionanotechnology
in particular. Chemistry, biology, and physics have revealed
an immense amount of information on molecular structure and
function, and now we are poised to make use of it for atomic-level engineering.
New discoveries are being made every day, and... |  |  |  |  Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable
thing — adapt their existing Cocoa computer application programming
framework to make applications for a touch-based device with limited memory and
speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact,
turned... |
|
|
Result Page: 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 |