Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
Handbook of Mathematical Formulas and Integrals, Fourth Edition
Handbook of Mathematical Formulas and Integrals, Fourth Edition
This book contains a collection of general mathematical results, formulas, and integrals that occur throughout applications of mathematics. Many of the entries are based on the updated fifth edition of Gradshteyn and Ryzhik’s ”Tables of Integrals, Series, and Products,” though during the preparation of the book, results were also...
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
This book is a crystallization of the authors' work over the last twenty-five years. The book covers the latest advances in grey information and systems research, providing a state-of-the-art overview of this important field. Covering the theoretical foundation, fundamental methods and main topics in grey information and systems research, this book...
Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Bacterial contamination of food and water resources, as well as the increasing incidence of nosocomial infections, has us on our toes, looking for ways of recognizing these elements. In addition, the recent and growing threats to personal and territorial securities make this task even  more urgent. Therefore, accurate assessment of the state...
Public Key Infrastructure and Implementation and Design
Public Key Infrastructure and Implementation and Design
Today we are in the midst of an electronic business revolution. The growth of the Internet and e−commerce has presented businesses with an opportunity to forge new links with customers and partners by transcending borders and removing geographical barriers. Electronic information exchange and networking poses a greater threat than ever before...
Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Scrambling Techniques for CDMA Communications
Scrambling Techniques for CDMA Communications
Scrambling Techniques for CDMA Communications addresses spreading, scrambling, and synchronization techniques for use in inter-cell synchronous and asynchronous CDMA systems, including the IMT-2000. It provides fundamental background material for sequences and shift register generators, and demonstrates various acquisition techniques...
Time Series Databases: New Ways to Store and Access Data
Time Series Databases: New Ways to Store and Access Data

Time series data is of growing importance, especially with the rapid expansion of the Internet of Things. This concise guide shows you effective ways to collect, persist, and access large-scale time series data for analysis. You’ll explore the theory behind time series databases and learn practical methods for implementing...

Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Implementing the IEEE Software Engineering Standards
Implementing the IEEE Software Engineering Standards
Implementing the IEEE Software Engineering Standards is a practical and professional guide to implementing the IEEE Software Engineering standards in your software development process. There are 39 complex standards involved, some more critical than others. This book explains where to start, which standards to implement first, and how to integrate...
unlimited object storage image
Result Page: 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy