Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Molecular Imaging Through Magnetic Resonance for Clinical Oncology
Molecular Imaging Through Magnetic Resonance for Clinical Oncology
Molecular imaging represents a new medical discipline that aims at uncovering molecular pathways of disease by integrating cellular and molecular biology with diagnostic imaging1,2. It encompasses several of the exciting imaging modalities that are capable of providing critical information for early detection and progression of...
The Ultimate Windows Server 2003 System Administrator's Guide
The Ultimate Windows Server 2003 System Administrator's Guide

Windows Server 2003 is more an update of Windows 2000 than a new operating system. This latest version of the base Windows NT technology now expands to support Microsoft's .NET Framework and new security initiatives. This book reflects these changes by expanding our previous book, The Ultimate Windows...

Learning UML 2.0
Learning UML 2.0

"Since its original introduction in 1997, the Unified Modeling Language has revolutionized software development. Every integrated software development environment in the world--open-source, standards-based, and proprietary--now supports UML and, more importantly, the model-driven approach to software development. This makes...

Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life
Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life

Many people suffer from relationships that leave them feeling manipulated and out of control. Whether it's within the context of a personal relationship, a family member, a friend, or someone at the workplace, these "toxic" relationships can erode a person's self-confidence and self-esteem, and have a strong, negative effect on their...

Sputtering Materials for VLSI and Thin Film Devices
Sputtering Materials for VLSI and Thin Film Devices

An important resource for students, engineers and researchers working in the area of thin film deposition using physical vapor deposition (e.g. sputtering) for semiconductor, liquid crystal displays, high density recording media and photovoltaic device (e.g. thin film solar cell) manufacturing. This book also reviews...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Digital Design (Verilog): An Embedded Systems Approach Using Verilog
Digital Design (Verilog): An Embedded Systems Approach Using Verilog

This book provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It deals with digital design as an activity in a larger systems design context. Instead of focusing on gate-level design and aspects of digital design that have diminishing relevance in a real-world...

Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL
Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet Agents with PHP/CURL

The Internet is bigger and better than what a mere browser allows. Webbots, Spiders, and Screen Scrapers is for programmers and businesspeople who want to take full advantage of the vast resources available on the Web. There's no reason to let browsers limit your online...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Designing Scalable .NET Applications (Expert's Voice)
Designing Scalable .NET Applications (Expert's Voice)

The key issue for all enterprise developers, regardless of platform, is how to design for growth. This is the first book that addresses how to build scalable .NET applications. Given Rossberg and Redler's extensive consulting experience, this book is based on their combined real world experience with numerous large .NET installations.

...
SWT: A Developer's Notebook (Developer's Notebook)
SWT: A Developer's Notebook (Developer's Notebook)
In typical Developer's Notebook style, you'll learn how to take SWT out for a spin, make it work for you,and turn it upside down, all without wasted words or space. Each lab in this notebook details a specific task; you can read from the first page to the last, look up just what you need to know, and even squeeze...
Marketing Strategy and Competitive Positioning (4th Edition)
Marketing Strategy and Competitive Positioning (4th Edition)

Thoroughly updated with new examples and the latest research findings, this new edition also boasts updates case studies in each chapter, taken from recent editions of the Financial Times, that illustrate the practical implications of the issues raised.

This book is about creating and sustaining superior performance in the
...
unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy