Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Environmental Analysis (Analytical Techniques in the Sciences)
Introduction to Environmental Analysis (Analytical Techniques in the Sciences)
Global awareness of the importance of monitoring and protecting our environment has grown considerably over the last ten years. Environmental concerns are now an integral part of today's legislation, product design and development, waste minimization and disposal. As well as background monitoring of the environment, scientists are involved in...
Mind Games: The Aging Brain and How to Keep it Healthy
Mind Games: The Aging Brain and How to Keep it Healthy
The brain, just like any other muscle, is strengthened through use. Mind Games teaches you the latest concepts on the workings of memory and how to apply them to "train your brain." Whether you are looking to sharpen your own memory, or the memory of a loved one, this book will provide the strategies and techniques needed. From mental...
Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)
Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)

Considering the impact of translational breakthroughs on the early detection, diagnosis, prevention, and treatment of breast cancer, this all-encompassing guide collects cutting-edge research on the most promising strategies and agents likely to impact the management and long-term outcomes of women with breast cancer. This book will provide...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code (Expert's Voice)
Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code (Expert's Voice)
IT HAS BEEN DOCUMENTED that the maintenance phase of the typical software project’s life cycle accounts for over 60 percent of the total cost incurred. For all the pomp and circumstance heaped upon the design phase, once the first release has been deployed, most of the resources will be spent on fixing bugs, adding new features, and...
Encyclopedia of Communities of Practice in Information and Knowledge Management
Encyclopedia of Communities of Practice in Information and Knowledge Management
"This encyclopedia has a breadth and depth that makes it a valuable reference work for anyone." --Prof. Miles Nicholls, RMIT University, Australia

The Encyclopedia of Communities of Practice in Information and Knowledge Management is the leading reference source for dynamic and innovative research in the field of
...
Computer Animation: Algorithms and Techniques (The Morgan Kaufmann Series in Computer Graphics)
Computer Animation: Algorithms and Techniques (The Morgan Kaufmann Series in Computer Graphics)

Whether you're a programmer developing new animation functionality or an animator trying to get the most out of your current animation software, Computer Animation: Algorithms and Techniques will help work more efficiently and achieve better results. For programmers, this book provides a solid theoretical orientation and extensive...

Web Development and Design Foundations with XHTML, 5th Edition
Web Development and Design Foundations with XHTML, 5th Edition
Web Development and Design Foundations with XHTML is intended for use in a beginning Web development course. Since CSS has become a standard for Web design, this edition introduces CSS early on and integrates this topic throughout the text, including CSS-based page layouts.

Using Hands-On Practice exercises and Web Site Case...

The Confident Student (Available Titles Coursemate)
The Confident Student (Available Titles Coursemate)

Thank you for choosing Th e Confi dent Student, Seventh Edition. Th is book is special for several reasons. It has grown with the times to refl ect pedagogical changes, technological advancements, and students’ needs. Yet Th e Confi dent Student’s core values of individual responsibility and confi dence through accomplishment...

Broadband Strategies Handbook (World Bank Publications)
Broadband Strategies Handbook (World Bank Publications)

The world is shifting from narrowband to broadband. Services that were only available in the form of static, text-based websites a decade ago are now offered in full-motion, high-definition video. A whole new generation of Internet entrepreneurs is ready to take their ideas to the stock market.

Nevertheless, a gap remains between...

Advertisers at Work
Advertisers at Work

“Conversations with some of the sharpest minds in advertising lead the reader gently into the heart of the business. A great read whether you’re starting out in advertising or simply want to pick up some tips from the greats.”

Mark Tungate, author of Adland: A Global History of...

Tissue Engineering
Tissue Engineering

Increasingly viewed as the future of medicine, the field of tissue engineering is still in its infancy. As evidenced in both the scientific and popular press, there exists considerable excitement surrounding the strategy of regenerative medicine. To achieve its highest potential, a series of technological advances must be made. Putting the...

unlimited object storage image
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy