Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB
Learn how to solve complex differential equations using MATLAB®

Introduction to Numerical Ordinary and Partial Differential Equations Using MATLAB® teaches readers how to numerically solve both ordinary and partial differential equations with ease. This innovative publication brings together a skillful treatment of MATLAB...

Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

American Government: Constitutional Democracy Under Pressure
American Government: Constitutional Democracy Under Pressure

American Government: Constitutional Democracy Under Pressure highlights the necessary tension between our constitutional principles and institutions and the populist heat that sometimes roils our national politics, especially at the current political moment. Our constitutional democracy has been under pressure for some time,...

Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
In the world we live in concurrency is the norm. For example, the human body
is a massively concurrent system, comprising a huge number of cells, all simultaneously
evolving and independently engaging in their individual biological
processing. In addition, in the biological world, truly sequential systems rarely
arise. However,
...
Content Networking: Architecture, Protocols, and Practice (The Morgan Kaufmann Series in Networking)
Content Networking: Architecture, Protocols, and Practice (The Morgan Kaufmann Series in Networking)
"This book is an invaluable resource for anyone interested in understanding the rationale and technology driving the evolution of the Web. I especially liked the way the authors tie together the various elements and protocols that make up content distribution systems over the Web."
--Prof. Dr. Ralf Steinmetz, Head of Multimedia
...
Microwave Circuit Modeling Using Electromagnetic Field Simulation
Microwave Circuit Modeling Using Electromagnetic Field Simulation
This unique 'how to' book is an ideal introduction to electromagnetic field-solvers. It provides you with helpful advice on selecting the right tools for your RF and high-speed digital circuit design work. The focus is on the strengths and weaknesses of the major commercial software packages. Featuring full-color illustrations, this practical...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Software Testing and Analysis: Process, Principles and Techniques
Software Testing and Analysis: Process, Principles and Techniques
The first comprehensive book on software test and analysis

You can't “test quality into” a software product, but neither can you build a quality software product without test and analysis.  Software test and analysis is increasingly recognized, in research and in industrial practice, as a core challenge in...

Mastering AutoCAD 2008 and AutoCAD LT 2008
Mastering AutoCAD 2008 and AutoCAD LT 2008
The World's Bestselling AutoCAD Resource Fully Updated for 2008

There's a reason why Mastering AutoCAD is so popular year after year. Loaded with concise explanations, step-by-step instructions, and hands-on projects, this comprehensive reference and tutorial from award-winning author George Omura has everything you...

Oracle PL/SQL Best Practices
Oracle PL/SQL Best Practices
In this compact book, Steven Feuerstein, widely recognized as one of the world's leading experts on the Oracle PL/SQL language, distills his many years of programming, teaching, and writing about PL/SQL into a set of best practices-recommendations for developing successful applications. Covering the latest Oracle release, Oracle Database 11g,...
unlimited object storage image
Result Page: 484 483 482 481 480 479 478 477 476 475 474 473 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy