Home | Amazing | Today | Tags | Publishers | Years | Search 
Multidimensional Liquid Chromatography: Theory and Applications in Industrial Chemistry and the Life Sciences
Multidimensional Liquid Chromatography: Theory and Applications in Industrial Chemistry and the Life Sciences
At least two driving forces have contributed to the recent increased use and development of multidimensional liquid chromatography (MDLC). These include the high resolution and peak capacity needed for proteomics studies and the independent size and chemical structure selectivity for resolving industrial polymers. In this regard,...
Ruby and MongoDB Web Development Beginner's Guide
Ruby and MongoDB Web Development Beginner's Guide
And then there was light – a lightweight database! How often have we all wanted some database that was "just a data store"? Sure, you can use it in many complex ways but in the end, it's just a plain simple data store. Welcome MongoDB!

And then there was light – a lightweight language that
...
LTE and the Evolution to 4G Wireless: Design and Measurement Challenges
LTE and the Evolution to 4G Wireless: Design and Measurement Challenges

The Next Generation: Wireless Communications for Multimedia and Beyond

From both a technical and a practical point of view, there is much to examine, evaluate and understand in the new 3GPP LTE cellular technology before its projected deployment in 2010. This book, written by Agilent engineers in collaboration with Anite...

Programming Languages: Principles and Practices
Programming Languages: Principles and Practices

Kenneth Louden and Kenneth Lambert's new edition of PROGRAMMING LANGUAGES: PRINCIPLES AND PRACTICE, 3E gives advanced undergraduate students an overview of programming languages through general principles combined with details about many modern languages. Major languages used in this edition include C, C++, Smalltalk, Java, Ada, ML,...

Design for Hackers: Reverse Engineering Beauty
Design for Hackers: Reverse Engineering Beauty

The smash hit introductory design book that debuted at #18 on Amazon
Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google
...

Engineering Mathematics
Engineering Mathematics

John Bird's approach to mathematics, based on numerous worked examples supported by problems, is ideal for students of a wide range of abilities. Theory is kept to a minimum, with the emphasis firmly placed on problem-solving skills, making this a thoroughly practical introduction to the mathematics engineering students need to...

Applications of Algebra to Communications, Control, and Signal Processing (SpringerBriefs in Computer Science)
Applications of Algebra to Communications, Control, and Signal Processing (SpringerBriefs in Computer Science)

Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO...

Digital Filters and Signal Processing in Electronic Engineering: Theory, Applications, Architecture, Code (Woodhead Publishing Series in Optical and Electronic Materials)
Digital Filters and Signal Processing in Electronic Engineering: Theory, Applications, Architecture, Code (Woodhead Publishing Series in Optical and Electronic Materials)
From industrial and teaching experience the authors provide a blend of theory and practice of digital signal processing (DSP) for advanced undergraduate and post-graduate engineers reading electronics. This fast-moving, developing area is driven by the information technology revolution. It is a source book in research and development for...
Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

Make Millions and Make Change!: Secrets to Business and Personal Success
Make Millions and Make Change!: Secrets to Business and Personal Success

Make Millions and Make Change! is your essential guide to business and personal success. While the title of this book may sound like a get-rich-quick scheme, the methods that are shared get real people rich in the real world, even during the most difficult economic times. Building your brand into a sustainable business is an immense...

Making TeX Work (A Nutshell handbook)
Making TeX Work (A Nutshell handbook)

TeX is a powerful tool for creating professional quality typeset text and is unsurpassed at typesetting mathematical equations, scientific text, and multiple languages. Many books describe how you use TeX to construct sentences, paragraphs, and chapters. Until now, no book has described all the software that actually lets you build,...

The Employer Bill of Rights: A Manager's Guide to Workplace Law
The Employer Bill of Rights: A Manager's Guide to Workplace Law

Any employee can sue any employer at any time, and for just about any reason. There is no such thing as a bulletproof personnel decision. It’s no wonder businesses fear lawsuits from employees—they are costly in terms of time, money, and distraction.  

But fear not. The Employer Bill of Rights: A...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy