Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reviews in Computational Chemistry, Reviews in Computational Chemistry, Volume 18
Reviews in Computational Chemistry, Reviews in Computational Chemistry, Volume 18

This volume, like those prior to it, features chapters by experts in various fields of computational chemistry. Topics covered in Volume 18 include molecular modeling, computer-assisted molecular design (camd), quantum chemistry, molecular mechanics and dynamics, and quantitative structure-activity relationships (qsar).

After our
...
Computer Science Illuminated
Computer Science Illuminated
Welcome to Computer Science Illuminated! This book provides a broad and thorough exploration of computer systems within a computer science context. Although this is classified as a CS-0 book, we realize that the term CS-0 means different things to different people.

Independently, both of us have written successful textbooks on various
...
IPv6 Security
IPv6 Security

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes many of these...

Laparoscopic Urologic Surgery in Malignancies
Laparoscopic Urologic Surgery in Malignancies
The era of endo-oncology has arrived. Endo-oncology is now firmly en- trenched in the diagnosis and management of urologic cancers. From its early days with transurethral resection of bladder tumors, to the more recent de- cades with establishment of techniques for percutaneous resection of transi- tional cell carcinoma,...
Prevention of Coronary Heart Disease: From the Cholesterol Hypothesis to w6/w3 Balance Contributions by Okuyama, H. (Nagoya); Ichikawa, Y. (Nagoya); ... Review of Nutrition and Dietetics, Vol. 96)
Prevention of Coronary Heart Disease: From the Cholesterol Hypothesis to w6/w3 Balance Contributions by Okuyama, H. (Nagoya); Ichikawa, Y. (Nagoya); ... Review of Nutrition and Dietetics, Vol. 96)

This publication is organized in an exceptional way: Each chapter introduces several completed clinical trials and provides the original conclusions and discussions of the results. The authors then contribute their own comments and interpretations of the findings, challenging the prevailing belief that serum cholesterol is a mediator of...

Java Cookbook
Java Cookbook
This book offers Java developers short, focused pieces of code that are easy to incorporate into other programs. The idea is to focus on things that are useful, tricky, or both. The book's code segments cover all of the dominant APIs and should serve as a great "jumpingoff place" for Java developers who want to get started in areas...
The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage
The Value Factor: How Global Leaders Use Information for Growth and Competitive Advantage

Capitalizing on the information a company owns about its customers, suppliers and partners is now the value proposition for sustainable long-term growth. Authors Mark Hurd and Lars Nyberg go inside companies to see the value proposition in practice. Combining case studies and analysts’ insights with common sense and surprisingly simple...

An Introduction to Control Systems
An Introduction to Control Systems

This significantly revised edition presents a broad introduction to Control Systems and balances new, modern methods with the more classical. It is an excellent text for use as a first course in Control Systems by undergraduate students in all branches of engineering and applied mathematics. The book contains: A comprehensive coverage of...

Book of Numbers
Book of Numbers

This book, more than any other I’ve written up to this point in my life, was a labor of love. It allowed me to combine the knowledge and experience of two careers (over a decade in government and law enforcement, and close to another decade in the computer field, encompassing almost 20 years of working with computers as a hobbyist).When...

Java Foundations
Java Foundations
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Handbook of Research on Green ICT: Technology, Business and Social Perspectives (2 vol)
Handbook of Research on Green ICT: Technology, Business and Social Perspectives (2 vol)

The Handbook of Research on Green ICT: Technology, Business and Social Perspectives is the outcome of various debates, discussions, investigations and actions into a vital topic of today – Information and Communications Technology (ICT) -based business activities and the environment. This handbook draws on thoughts, insights,...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

unlimited object storage image
Result Page: 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy