Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
3D Printing For Dummies
3D Printing For Dummies

Get started printing out 3D objects quickly and inexpensively!

3D printing is no longer just a figment of your imagination. This remarkable technology is coming to the masses with the growing availability of 3D printers. 3D printers create 3-dimensional layered models and they allow users to create prototypes that use...

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

From Concept to Wall Street: A Complete Guide to Entrepreneurship and Venture Capital
From Concept to Wall Street: A Complete Guide to Entrepreneurship and Venture Capital
From Concept to Wall Street is the definitive guide to the new realities of venture capital. Two leading experts in venture-backed entrepreneurship offer start-to-finish coverage of the entire process: planning, teambuilding, protecting intellectual property, identifying and negotiating funding, and managing to...
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Agent-Oriented Programming: From Prolog to Guarded Definite Clauses (Lecture Notes in Computer Science)
Agent-Oriented Programming: From Prolog to Guarded Definite Clauses (Lecture Notes in Computer Science)
The authors present a systematic development of the concurrent object-oriented agent programming language Guarded Definite Clauses (GDC). In contrast to other languages used in agent programming, like Java, Telescript, and Agent-TCL, this language is derived from the artificial intelligence programming tradition and emphasizes AI applications. The...
On the Shoulders of Giants: A Course in Single Variable Calculus
On the Shoulders of Giants: A Course in Single Variable Calculus

This book presents an innovative treatment of single variable calculus designed as an introductory mathematics textbook for engineering and science students. The subject material is developed by modelling physical problems, some of which would normally be encountered by students as experiments in a first year physics course. The solutions of...

The Open Source Alternative: Understanding Risks and Leveraging Opportunities
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
In the late 1990s, working as a lawyer in a technology licensing practice, I found more and more of my clients using software provided under a very unusual license. My colleagues at the time advised clients to avoid this kind of software, because although this software was free of charge, it was likely to infringe intellectual property rights and...
Heat Shock Proteins in Cancer
Heat Shock Proteins in Cancer

Heat shock proteins are emerging as important molecules in the development of cancer and as key targets in cancer therapy. These proteins enhance the growth of cancer cells and protect tumors from treatments such as drugs or surgery. However, new drugs have recently been developed particularly those targeting heat shock protein 90. As heat...

Managing Intellectual Assets in the Digital Age
Managing Intellectual Assets in the Digital Age
This book examines challenges and opportunities associated with the development, distribution, and use of intellectual property and knowledge assets. For purposes of this book, intellectual property consists of the creative works that are governed by the principles of traditional intellectual property law: copyrights, patents, and trademarks....
Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have
...

WPF Programmer's Reference: Windows Presentation Foundation with C# 2010 and .NET 4
WPF Programmer's Reference: Windows Presentation Foundation with C# 2010 and .NET 4

Build effective user interfaces with Windows Presentation Foundation

Windows Presentation Foundation (WPF) is included with the Windows operating system and provides a programming model for building applications that provide a clear separation between the UI and business logic. Written by a leading expert on Microsoft...

Symmetry (Spectrum)
Symmetry (Spectrum)

We are all familiar with the everyday notion of two-sided symmetry, as viewed for example in the external form of the human body. But in its broadest interpretation symmetry is a property which involves regularity and repetition. In this sense symmetry can be found everywhere, especially in science and art. The aim of this book is to present...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy