Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Statistics in Clinical Oncology (Fluid Power and Control Series)
Handbook of Statistics in Clinical Oncology (Fluid Power and Control Series)

This book compiles state-of-the-art statistical approaches to solving problems in clinical oncology, focusing on clinical trials in phases I, II, and III, as well as quality of life and economic analyses, and exploratory methods.
Examines trial design treatment based on toxicity and survival!
Featuring over 1000 references,
...

Transactions on Pattern Languages of Programming III (Lecture Notes in Computer Science)
Transactions on Pattern Languages of Programming III (Lecture Notes in Computer Science)

The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The primary focus of this LNCS Transactions...

Software Testing: Concepts and Operations (Quantitative Software Engineering Series)
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)

Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test management

This book examines the principles, concepts, and processes that are fundamental to
...

Android Application Development with Maven
Android Application Development with Maven

Learn how to use and configure Maven to support all phases of the development of an Android application

About This Book

  • Learn how to effectively use Maven to create, test, and release Android applications
  • Customize Maven using a variety of suggested plugins for the most popular Android...
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

The SketchUp Workflow for Architecture: Modeling Buildings, Visualizing Design, and Creating Construction Documents with SketchUp Pro and LayOut
The SketchUp Workflow for Architecture: Modeling Buildings, Visualizing Design, and Creating Construction Documents with SketchUp Pro and LayOut

Incorporate SketchUp into every phase of your design

If you want to go beyond the basics and start using SketchUp 3D modeling software in all phases of your design, The SketchUp Workflow for Architecture is the perfect place to start. From preliminary schematics to construction documentation and everything in between, the...

Modern Compiler Implementation in C
Modern Compiler Implementation in C

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code...

Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)
Database Systems: A Practical Approach to Design, Implementation and Management (4th Edition)

This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology...

Functional and Object Oriented Analysis and Design: An Integrated Methodology
Functional and Object Oriented Analysis and Design: An Integrated Methodology
Functional and Object Oriented Analysis and Design: An Integrated Methodology teaches students of information systems, software engineering, computer science and related areas how to analyze and design information systems using the FOOM methodology. FOOM combines the object-oriented approach and the functional (process-oriented) approach. It...
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code

Explore various verticals in software engineering through high-end systems using Python

Key Features

  • Master the tools and techniques used in software engineering
  • Evaluates available database options and selects one for the final Central Office system-components
  • ...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services
Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services
Build machine learning (ML) solutions for Java development. This book shows you that when designing ML apps, data is the key driver and must be considered throughout all phases of the project life cycle. Practical Java Machine Learning helps you understand the importance of data and how to organize it for use...
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy