|
|
Information Retrieval Interaction
Information retrieval covers the problems relating to the effective storage, access, and searching of information required by individuals. Currently, information is continuing to grow exponentially, diversifying into many forms and media. In this complex retrieval labyrinth there is a definite need for increased effort aimed at tailoring IR... | | Thermal Design of Electronic Equipment (Electronics Handbook Series)
In a field where change and growth is inevitable, new electronic packaging problems continually arise. Smaller, more powerful devices are prone to overheating, causing intermittent system failures, corrupted signals, lower MTBF, and outright system failure. Since convection cooling is the heat transfer path most engineers take to deal with... | | Documenting Software Architectures: Views and Beyond (2nd Edition)
“This new edition is brighter, shinier, more complete, more pragmatic, more focused than the previous one, and I wouldn’t have thought it possible to improve on the original. As the field of software architecture has grown over these past decades, there is much more to be said, much more that we know, and much more that we can... |
|
|
Python for Bioinformatics
Programming knowledge is often necessary for finding a solution to a biological problem. Based on the author’s experience working for an agricultural biotechnology company, Python for Bioinformatics helps scientists solve their biological problems by helping them understand the basics of programming. Requiring no prior... | | JavaScript Testing Beginner's Guide
JavaScript is an important part of web development in today's Web 2.0 world. While there are many JavaScript frameworks in the market, learning to write, test, and debug JavaScript without the help of any framework will make you a better JavaScript developer. However, testing and debugging can be time consuming, tedious, and painful. This... | | Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |
|
|
Result Page: 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 |