Home | Amazing | Today | Tags | Publishers | Years | Search 
Neutron Scattering, Volume 44 (Experimental Methods in the Physical Sciences)
Neutron Scattering, Volume 44 (Experimental Methods in the Physical Sciences)

This work covers in some detail the application of neutron scattering to different fields of physics, materials science, chemistry, biology, the earth sciences and engineering. Its goal is to enable researchers in a particular area to identify aspects of their work in which neutron scattering techniques might contribute, conceive the...

Project Management Demystified
Project Management Demystified
When my old grandfather came back from a long night watching over the local sardine factory he would often say ‘You can never do well as a nightwatchman, my boy’. It took many years of hearing this seven times a week before I realized what he meant. If he did his nightwatchman job perfectly by staying awake all night,...
CJKV Information Processing: Chinese, Japanese, Korean & Vietnamese Computing
CJKV Information Processing: Chinese, Japanese, Korean & Vietnamese Computing

First published a decade ago, CJKV Information Processing quickly became the unsurpassed source of information on processing text in Chinese, Japanese, Korean, and Vietnamese. It has now been thoroughly updated to provide web and application developers with the latest techniques and tools for disseminating information directly...

Data Fusion: Concepts and Ideas
Data Fusion: Concepts and Ideas

This textbook provides a comprehensive introduction to the concepts and idea of multisensor data fusion.
It is an extensively revised second edition of the author's successful book: "Multi-Sensor Data Fusion:
An Introduction" which was originally published by Springer-Verlag in 2007.
The main changes in
...

Component Development for the Java? Platform
Component Development for the Java? Platform

If you're serious about writing components in Java, this book focuses on the component services you need to master. DevelopMentor Chief Scientist Stuart Halloway presents unprecedented, in-depth coverage of writing, deploying, and maintaining Java components. Halloway begins by showing how to use, control, and troubleshoot components. He...

Principles and Practice of Pediatric Surgery
Principles and Practice of Pediatric Surgery
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient,...
Sex, Lies, and Menopause: The Shocking Truth About Synthetic Hormones and the Benefits of Natural Alternatives
Sex, Lies, and Menopause: The Shocking Truth About Synthetic Hormones and the Benefits of Natural Alternatives

Turning thirty years of medical and cultural wisdom on its head, Sex, Lies, and Menopause challenges both the medical establishment and modern feminists to prove that menopause does not have to be deadly.

In this revolutionary work -- a landmark that signals the true beginning of feminist medicine -- a doctor, a...

Visualizing Quaternions (The Morgan Kaufmann Series in Interactive 3D Technology)
Visualizing Quaternions (The Morgan Kaufmann Series in Interactive 3D Technology)

Introduced 160 years ago as an attempt to generalize complex numbers to higher dimensions, quaternions are now recognized as one of the most important concepts in modern computer graphics. They offer a powerful way to represent rotations and compared to rotation matrices they use less memory, compose faster, and are naturally suited for...

Congestive Heart Failure
Congestive Heart Failure
Having first decided to organize and edit a book on heart failure in 1992 (with a 1994 publication date), we have been astounded at the changes in the field over a relatively brief 14-year period. It is with some amusement that we now look back at our first edition and note a combined chapter of beta agonists and...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)
Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)

Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy