|
|
|
|
Intelligent Databases: Technologies and ApplicationsComputer-based information technologies have been extensively used to help many organizations, private companies, and academic and education institutions manage their processes and information systems hereby become their nervous center. Information systems are used to manage data. The explosion of massive data sets created by businesses, science... | | Microsoft Dynamics NAV 2009 Application Design
Dynamics NAV 2009 is an Enterprise Resource Planning (ERP) software product from Microsoft that can be used for variety of business needs. It is part of the Microsoft Dynamics family, and intended to assist with finance, manufacturing, Customer Relationship Management, supply chains, analytics, and electronic commerce for small and... | | Protocols for Micropropagation of Woody Trees and Fruits
Micropropagation has become a reliable and routine approach for large-scale rapid plant multiplication, which is based on plant cell, tissue and organ culture on well defined tissue culture media under aseptic conditions. A lot of research efforts are being made to develop and refine micropropagation methods and culture media for large-scale... |
|
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
In everyday life, we often come in contact with compressed signals: when using
mobile telephones, mp3 players, digital cameras, or DVD players. The signals in each
of these applications, telephone-band speech, high fidelity audio signal, and still or
video images are not only sampled and quantized to put them into a form suitable for... | | Automating Microsoft Azure with Powershell
Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments
About This Book
-
Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
- ...
| | Computer and Information Security Handbook
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical... |
|
Encyclopedia of Big Data Technologies
The Encyclopedia of Big Data Technologies provides researchers, educators, students and industry professionals with a comprehensive authority over the most relevant Big Data Technology concepts. With over 300 articles written by worldwide subject matter experts from both industry and academia, the encyclopedia covers topics... | | Lysosomal Storage Disorders: A Practical Guide
Awareness of lysomal storage disorders needs to be raised and there is very substantial pharmaceutical interest to do so. The disorders are often viewed as obscurities but in fact they are treatable. Enzyme replacement therapy is available for four of the disorders and will be available for a further three disorders in the course of the next... | | Hacking Raspberry Pi
DIY hardware hacking...easy as Pi ®!
Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful... |
|
|
|
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 |