|
|
|
|
Atomic Force Microscopy: Understanding Basic Modes and Advanced Applications
This book enlightens readers on the basic surface properties and distance-dependent intersurface forces one must understand to obtain even simple data from an atomic force microscope (AFM). The material becomes progressively more complex throughout the book, explaining details of calibration, physical origin of artifacts, and... | | Technology Entrepreneurship: Creating, Capturing, and Protecting Value
Recognizing the unique needs of the technology startup, Duening focuses on intellectual property development, funding, and marketing/selling more than other texts in this market. Extensive use of technology examples, case studies, and assignments keeps the book relevant and motivating for engineering students. A full supplements package,... | | The Legal Protection of Databases: A Comparative AnalysisThis book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers... |
|
|
Japan Style: Architecture Interiors DesignEnter the world of the stylish Japanese house, where every object in sight is a work of art. Japan Style introduces 20 special residences. With more than 200 color photographs, this book showcases the stunning beauty of old homes, and reveals how they are cared for by their owners. Traditional Japanese homes, with superbly crafted... | | How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO
In just under a decade, Facebook has gone from a Harvard prodigy's dorm-room experiment to an essential part of the social life of hundreds of millions of children, teens, and adults across the globe. It's no surprise, then, that the company has been the subject of countless magazine articles, books, and even movies. But despite the... | | Stolen Women in Medieval England: Rape, Abduction, and Adultery, 1100-1500
This study of illicit sexuality in medieval England explores links between marriage and sex, law and disorder, and property and power. Some medieval Englishwomen endured rape or were kidnapped for forced marriages, yet most ravished women were married and many 'wife-thefts' were not forced kidnappings but cases of adultery... |
|
ADO : ActiveX Data ObjectsGetting data across platforms and formats is a cornerstone of present-day applications development. ADO: ActiveX Data Objects is both an introduction and a complete reference to ADO (ActiveX Data Objects), Microsoft's universal data access solution. You'll learn how to easily access data in multiple formats--such as email messages,... | | Security Engineering: A Guide to Building Dependable Distributed Systems
For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.
This is changing, and quickly. Most records... | | Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)
Expert C# 5.0 is a book about getting the best from C#. It’s based on the principle that to write good, high-performance, robust applications you need to understand whats going on deep under the hood. If you are already experienced with writing managed applications and want to learn more about how to get the best from the ... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |