Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing Mobile Service Systems (Research in Design Series)
Designing Mobile Service Systems (Research in Design Series)
This book is the second in the Research in Design series. Design is an effort that enjoys a growing attention in the academic world. At Delft University of Technology design is a recognized part of science. Like other technical universities, Delft is rooted in the engineering field. And in spite of questions like ‘what is design’,...
Introduction to Fluid Mechanics: includes CD
Introduction to Fluid Mechanics: includes CD
This book is intended primarily for use in a one-quarter or one-semester introductory fluid mechanics course. Our goal is to provide both a balanced introduction to all the tools used for solving fluid mechanics problems today and a foundation for further study of this important and exciting field. By learning about analytical, empirical (existing...
Alice 3 Cookbook
Alice 3 Cookbook

Alice is a free and innovative 3D programming environment that makes it easy to create an animation for telling a story, playing an interactive game, or a video to share on the Web. Alice is a teaching tool designed as a revolutionary approach to teaching and learning introductory programming concepts.

Alice 3 Cookbook focuses on...

Agent-based Ubiquitous Computing (Atlantis Ambient and Pervasive Intelligence)
Agent-based Ubiquitous Computing (Atlantis Ambient and Pervasive Intelligence)
Ubiquitous computing names the third wave in computing, where the personal computing era appears when technology recedes into the background of our lives. The widespread use of new mobile technology implementing wireless communications such as personal digital assistants (PDAs) and smart phones enables a new type of advanced...
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)
Hacker Techniques, Tools, and Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series)

Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks...

Professional Windows 8 Programming: Application Development with C# and XAML
Professional Windows 8 Programming: Application Development with C# and XAML
IT SEEMS LIKE YESTERDAY that Microsoft announced at its first annual BUILD conference the upcoming game-changing operating system: Windows 8. In the Microsoft world for the first time, Windows 8 was to provide an operating system that could create an ecosystem of apps that ran among phones, desktop computers, and tablets. Developers...
Gene Engineering in Endocrinology (Contemporary Endocrinology)
Gene Engineering in Endocrinology (Contemporary Endocrinology)

During the past five to ten years, a variety of tools has been developed in the disciplines of both gene engineering, and molecular and structural biology. Some of these advances have permitted scientists not only to identify and characterize genes, but also to target these genes by disruption, thus eliminating their function in living...

Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Office Home and Student 2010 All-in-One For Dummies
Office Home and Student 2010 All-in-One For Dummies

One-stop shopping for all the essentials of Office Home & Student 2010

The Home & Student version of Microsoft Office is ideal for anyone who needs the essential Office applications and can do without tools like Access and Outlook. The version includes Word, Excel, PowerPoint, and OneNote. Each minibook offers...

Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Knowledge Discovery from Data Streams (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)

In the last three decades, machine learning research and practice have focused on batch learning usually using small datasets. In batch learning, the whole training data is available to the algorithm, which outputs a decision model after processing the data eventually (or most of the times) multiple times. The rationale behind this...

unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy