Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Atomic Force Microscopy: Understanding Basic Modes and Advanced Applications
Atomic Force Microscopy: Understanding Basic Modes and Advanced Applications

This book enlightens readers on the basic surface properties and distance-dependent intersurface forces one must understand to obtain even simple data from an atomic force microscope (AFM). The material becomes progressively more complex throughout the book, explaining details of calibration, physical origin of artifacts, and...

Technology Entrepreneurship: Creating, Capturing, and Protecting Value
Technology Entrepreneurship: Creating, Capturing, and Protecting Value

Recognizing the unique needs of the technology startup, Duening focuses on intellectual property development, funding, and marketing/selling more than other texts in this market. Extensive use of technology examples, case studies, and assignments keeps the book relevant and motivating for engineering students. A full supplements package,...

The Legal Protection of Databases: A Comparative Analysis
The Legal Protection of Databases: A Comparative Analysis
This book examines and compares the several types of protection available for the protection of investment in database creation. The protection of investment in making databases is not harmonized internationally. In some countries, database contents are insufficiently protected and, in others, there is too much protection. While database producers...
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
Windows Server 2008 TCP/IP Protocols and Services
Windows Server 2008 TCP/IP Protocols and Services
This book is a straightforward discussion of the concepts, principles, and processes of many protocols in the TCP/IP protocol suite and how they are supported by Windows Server 2008 and Windows Vista. The focus of this book is on Internet Protocol version 4 (IPv4), referred to as Internet Protocol (IP), and associated transport and network...
Home Buying For Dummies (Business & Personal Finance)
Home Buying For Dummies (Business & Personal Finance)
Now updated — America's #1 bestselling home-buying book!

Want to buy a house, but concerned about the market? Have no fear — this trusted guide arms you with Eric Tyson and Ray Brown's time-tested advice and updated strategies for buying a home in current market conditions. You'll discover how to find the right property, make smart...

Japan Style: Architecture Interiors Design
Japan Style: Architecture Interiors Design
Enter the world of the stylish Japanese house, where every object in sight is a work of art. Japan Style introduces 20 special residences. With more than 200 color photographs, this book showcases the stunning beauty of old homes, and reveals how they are cared for by their owners.
Traditional Japanese homes, with superbly crafted
...
How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO
How to Create the Next Facebook: Seeing Your Startup Through, from Idea to IPO

In just under a decade, Facebook has gone from a Harvard prodigy's dorm-room experiment to an essential part of the social life of hundreds of millions of children, teens, and adults across the globe. It's no surprise, then, that the company has been the subject of countless magazine articles, books, and even movies. But despite the...

Stolen Women in Medieval England: Rape, Abduction, and Adultery, 1100-1500
Stolen Women in Medieval England: Rape, Abduction, and Adultery, 1100-1500

This study of illicit sexuality in medieval England explores links between marriage and sex, law and disorder, and property and power. Some medieval Englishwomen endured rape or were kidnapped for forced marriages, yet most ravished women were married and many 'wife-thefts' were not forced kidnappings but cases of adultery...

ADO : ActiveX Data Objects
ADO : ActiveX Data Objects
Getting data across platforms and formats is a cornerstone of present-day applications development. ADO: ActiveX Data Objects is both an introduction and a complete reference to ADO (ActiveX Data Objects), Microsoft's universal data access solution. You'll learn how to easily access data in multiple formats--such as email messages,...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)
Expert C# 5.0: with the .NET 4.5 Framework (Expert Apress)

Expert C# 5.0 is a book about getting the best from C#. It’s based on the principle that to write good, high-performance, robust applications you need to understand whats going on deep under the hood. If you are already experienced with writing managed applications and want to learn more about how to get the best from the ...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy