Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nanotechnology: Applications in Energy, Drug and Food
Nanotechnology: Applications in Energy, Drug and Food

Applications of nanotechnology are the remarkable sizes dependent on physiochemical properties of nanomaterials that have led to the developed protocols for synthesizing nanomaterials over a range of size, shapes and chemical compositions. Nanomaterials are normally powders composed of nanoparticles which exhibit properties...

Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to...
Samba: UNIX and NT Internetworking
Samba: UNIX and NT Internetworking
The target audience for this work includes systems programmers and administrators who are looking for assistance in implementing Samba in new and existing Windows and UNIX environments. A basic overview of both UNIX and Windows system and network architectures is provided to assist those readers whose primary background may be in one or the other...
Subdivision Methods for Geometric Design: A Constructive Approach (The Morgan Kaufmann Series in Computer Graphics)
Subdivision Methods for Geometric Design: A Constructive Approach (The Morgan Kaufmann Series in Computer Graphics)
Subdivision is an exciting new area in computer graphics that allows a geometric shape to be modeled as the limit of a sequence of increasingly faceted polyhedra. Companies such as Pixar and Alias/Wavefront have made subdivision surfaces the basic building block for much of their computer graphics/modeling software. Assuming a background of basic...
Automating the Design of Data Mining Algorithms: An Evolutionary Computation Approach (Natural Computing Series)
Automating the Design of Data Mining Algorithms: An Evolutionary Computation Approach (Natural Computing Series)

Traditionally, evolutionary computing techniques have been applied in the area of data mining either to optimize the parameters of data mining algorithms or to discover knowledge or patterns in the data, i.e., to directly solve the target data mining problem. This book proposes a different goal for evolutionary algorithms in data mining: to...

Create Your Own Digital Movies
Create Your Own Digital Movies
You bought a digital video camera so that you could take and transfer home movies to DVD easily. Only come to find out, it's not so easy when faced with the task on your own. Why does "going digital" seem like such a difficult endeavor? It doesn't have to be and Create Your Own Digital Movies can show you...
Angels Don't Play This haarp: Advances in Tesla Technology
Angels Don't Play This haarp: Advances in Tesla Technology
The U. S. Government has a new ground-based "Star Wars" weapon which is being tested in the remote bush country of Alaska. This new system manipulates the environment in a way which can:

• Disrupt human mental processes.
• Jam all global communications systems.
• Change weather patterns over large
...
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks
Programming Social Applications: Building Viral Experiences with OpenSocial, OAuth, OpenID, and Distributed Web Frameworks

I first began developing social applications when Facebook opened up its developer platform in 2007, giving people like me a taste of the extensive social data that an application can use to improve growth and target personalization settings. At the time, I was building social fantasy sports applications for CBSSports.com, pulling user...

Mathematical and Statistical Methods for Multistatic Imaging (Lecture Notes in Mathematics)
Mathematical and Statistical Methods for Multistatic Imaging (Lecture Notes in Mathematics)

This book covers recent mathematical, numerical, and statistical approaches for multistatic imaging of targets with waves at single or multiple frequencies. The waves can be acoustic, elastic or electromagnetic. They are generated by point sources on a transmitter array and measured on a receiver array. An important problem in multistatic...

Theory of Optimal Search
Theory of Optimal Search
This book deals with the problem of optimal allocation of effort to detect a  target. A Bayesian approach is taken in which it is assumed that there is a  prior distribution for the target's location which is known to the searcher as  well as a function which relates the conditional probability of detecting...
View Updating and Relational Theory (Theory in Practice)
View Updating and Relational Theory (Theory in Practice)

Views are virtual tables. That means they should be updatable, just as "real" or base tables are. In fact, view updatability isn’t just desirable, it’s crucial, for practical reasons as well as theoretical ones. But view updating has always been a controversial topic. Ever since the relational...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy