Home | Amazing | Today | Tags | Publishers | Years | Search 
Home Automation with Intel Galileo
Home Automation with Intel Galileo

Create thrilling and intricate home automation projects using Intel Galileo

About This Book

  • Make the most out of Intel Galileo by understanding its fundamentals and architecture
  • Explore sensors and devices to successfully control home functions like lights, security, energy management,...
Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Using Event-B for Critical Device Software Systems
Using Event-B for Critical Device Software Systems

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation).

This is assessed...

Bone Marrow and Stem Cell Transplantation (Methods in Molecular Biology)
Bone Marrow and Stem Cell Transplantation (Methods in Molecular Biology)

The second edition of Bone Marrow and Stem Cell Transplantation expands upon the previous edition with current, detailed methods on HLA, minor-HLA and Killer Immunoglobulin Like Receptor typing. With new chapters on immunophenotyping and functional characterization of stem cells are included. Written in the highly successful Methods...

Protein Structure Prediction (Methods in Molecular Biology)
Protein Structure Prediction (Methods in Molecular Biology)

Protein Structure Prediction, Third Edition expands on previous editions by focusing on software and web servers. With new chapters that provide instructions on how to use a computational method with examples of prediction by the method. Written in the highly successful Methods in Molecular Biology series format, chapters...

Synthetic Biology (Methods in Molecular Biology)
Synthetic Biology (Methods in Molecular Biology)

 In Synthetic Biology, expert researchers in the field provide the latest developments in molecular biology techniques used in Synthetic Biology.  Focusing on computational tools that will aid in systematising the design and construction of parts and systems. Written in the highly successful Methods in Molecular...

Genetic Damage in Human Spermatozoa (Advances in Experimental Medicine and Biology)
Genetic Damage in Human Spermatozoa (Advances in Experimental Medicine and Biology)

There are several types of damage that can be found in the male gamete. Genetic damage in spermatozoa can originate during spermatogenesis, or it can originate during transit in both male and female genital tracts. Damage can also be due to ageing, environmental or iatrogenic conditions, as well as to the protocols to cryopreserve and to...

Underwater Acoustic Networking Techniques (SpringerBriefs in Electrical and Computer Engineering)
Underwater Acoustic Networking Techniques (SpringerBriefs in Electrical and Computer Engineering)

This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration...

Securing Hadoop
Securing Hadoop

Implement robust end-to-end security for your Hadoop ecosystem

Overview

  • Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
  • Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
  • ...
Scheduling and Congestion Control for Wireless Internet (SpringerBriefs in Electrical and Computer Engineering)
Scheduling and Congestion Control for Wireless Internet (SpringerBriefs in Electrical and Computer Engineering)

This brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underlying optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP...

MRI: Basic Principles and Applications
MRI: Basic Principles and Applications

This new edition of the most accessible introduction to MRI principles and applications provides understandable yet comprehensive coverage including the latest developments in this fast paced field. It offers the only such concise overview of magnetic resonance physics, imaging techniques, hardware, and applications available. This Third...

Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy