Home | Amazing | Today | Tags | Publishers | Years | Search 
RF Mems Circuit Design for Wireless Communications
RF Mems Circuit Design for Wireless Communications
This book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable...
Organization Development at Work: Conversations on the Values, Applications, and Future of OD
Organization Development at Work: Conversations on the Values, Applications, and Future of OD
SHARE IN THE POWER, PURPOSE, AND PRACTICE OF OD

Organization Development at Work–a title in The Practicing OD Series–is a collection of conversations among leaders, practitioners, and educators in the organization development (OD) field. Throughout the book experienced professionals share their best thinking about principles,...

Project Sponsorship: Achieving Management Commitment for Project Success
Project Sponsorship: Achieving Management Commitment for Project Success
Praise for Project Sponsorship

"Project Sponsorship addresses vital ingredients that resonate with my recipe for project success—identifying the right people to sponsor projects, taking care of them, describing how to create an environment that leads to excellence in project sponsorship, and...

The Humane Interface: New Directions for Designing Interactive Systems
The Humane Interface: New Directions for Designing Interactive Systems

"Deep thinking is rare in this field where most companies are glad to copy designs that were great back in the 1970s. The Humane Interface is a gourmet dish from a master chef. Five mice!"
--Jakob Nielsen, Nielsen Norman Group
Author of Designing Web Usability: The Practice
...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Organizational Patterns of Agile Software Development
Organizational Patterns of Agile Software Development
You will find no books on the bookshelf here that tell you how to start up a new discipline. Software has been seeking its own way as a
relatively young discipline for the past 40 years. Every new discipline struggles to find practices suitable to its survival and growth. Sometimes this struggle is incremental. Sometimes disciplines undergo
...
Expert Network Time Protocol: An Experience in Time with NTP
Expert Network Time Protocol: An Experience in Time with NTP

Have you ever tried to figure out why your computer clock is off, or why your emails somehow have the wrong timestamp? Most likely, it’s due to an incorrect network time synchronization, which can be reset using the Network Time Protocol. Until now, most network administrators have been too paranoid to work with this, afraid that they...

Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)
Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Integrated Series in Information Systems)

Medical Informatics and biomedical computing have grown in quantum measure over the past decade. An abundance of advances have come to the foreground in this field with the vast amounts of biomedical and genomic data, the Internet, and the wide application of computer use in all aspects of medical, biological, and health care research and...

Elements of Photonics Volume 2
Elements of Photonics Volume 2
Provides a particularly good discussion of the electromagnetics of light in bounded media (i.e., fibers).

* The only book that treats the two complementary topics, fiber and integrated optics.
* A careful and thorough presentation of the topics that make it well suited for self-study.
* Includes numerous figures,
...
Windows Vista: The L Line, The Express Line to Learning
Windows Vista: The L Line, The Express Line to Learning
Welcome to Windows Vista: The L Line, The Express Line to Learning.

This book is one in a new tutorial series from Wiley Publishing created for independent learners, students, and teachers. Whether you are learning (or teaching) in a classroom setting or gaining new skills while you explore Windows Vista for fun, this book is for you. As
...
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of Information Transfer and Combinatorics' that was hosted from 2001-2004 at the Center for Interdisciplinary Research (ZIF) of Bielefeld University and also papers of several incorporated meetings thereof.

The 63 revised full...

An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition...
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy