Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applications of Biotechnology in Oncology
Applications of Biotechnology in Oncology

Applications of Biotechnology in Oncology collects key writings by Kewal K. Jain on the most important contributions of biotechnology to cancer research, particularly to the molecular diagnosis of cancer and drug delivery in cancer for personalized management of patients. Basics of various “omics” technologies and their...

Java 2 Core Language Little Black Book
Java 2 Core Language Little Black Book
The Java 2 Core Language Little Black Book is a compact, detailed reference for intermediate to experienced programmers and managers who are ready to learn how to build Java programs. The book features a logical, sequential approach with concise overviews and step-by-step, ready-to-use solutions created by a master Java programmer. This book is...
Handbook of Autopsy Practice
Handbook of Autopsy Practice

In Handbook of Autopsy Practice, Third Edition, Jurgen Ludwig, MD, has painstakingly updated and expanded his recognized "masterpiece" to create an indispensable and invaluable source of classic and innovative procedures for successful autopsy diagnosis and documentation. The section on autopsy methods has been modernized with...

Road Terrain Classification Technology for Autonomous Vehicle (Unmanned System Technologies)
Road Terrain Classification Technology for Autonomous Vehicle (Unmanned System Technologies)
This book provides cutting-edge insights into autonomous vehicles and road terrain classification, and introduces a more rational and practical method for identifying road terrain. It presents the MRF algorithm, which combines the various sensors’ classification results to improve the forward LRF for predicting upcoming road terrain types....
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Microsoft  Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Delivering immediate answers for the day-to-day administration of ISA Server 2004, this guide offers the focused, straightforward information you need to solve problems and get the job done.

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA...

Adaptive Business Intelligence
Adaptive Business Intelligence
From the reviews of the first edition: 

"In this book the authors explain the science and application of numerous prediction and optimization techniques as well as how these concepts can be used to develop adaptive decision-making systems. The book is suitable for business and IT managers who make decisions in complex industrial and...

Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Driven by the demand for high-data-rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. These technologies include gigabit wireless personal area networks (WPAN), high-speed wireless local area networks (WLAN), and high-speed wireless metropolitan area networks (WMAN). As a result of this...
Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
Electrician's Troubleshooting and Testing Pocket Guide, Third Edition
The ultimate electrical equipment troubleshooting pocket guide

Designed for quick reference at any job site, the Electrician's Troubleshooting and Testing Pocket Guide enables electricians using portable meters to test, maintain, and troubleshoot all types of electrical equipment and systems.

This updated...

Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
This practical book is for anyone who needs to understand the solutions that allow multimedia communications between mobile networks and fixed wireless communications. It presents the fundamentals of individual fixed and mobile wireless technologies in terms of architectures, standards, management capabilities and quality of service issues, is...
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP shows non-programmers how Access databases can be created, managed, and customized with Visual Basic for Applications (VBA) -- a powerful programming language built into Access. Hundreds of hands-on examples and projects throughout the book show users how to take charge of their Access...
CMOS IC Layout: Concepts, Methodologies, and Tools
CMOS IC Layout: Concepts, Methodologies, and Tools
Once upon a time, around about 1988, after finishing a very stressful but successful project within Motorola Semiconductor Israel (MSIL), the entire team was invited to a special lunch. Everybody was happy that we finished the “project” ahead of time, and we were there to enjoy the victory of “tape-out.”...
unlimited object storage image
Result Page: 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy