Home | Amazing | Today | Tags | Publishers | Years | Search 
BioMEMS and Biomedical Nanotechnology
BioMEMS and Biomedical Nanotechnology
Numerous miniaturized DNA microarray, DNA chip, Lab on a Chip and biosensor devices have been developed and commercialized. Such devices are improving theway many important genomic and proteomic analyses are performed in both research and clinical diagnostic laboratories. The development of these technologies was enabled by a...
Atmospheric Deposition: In Relation to Acidification and Eutrophication (Studies in Environmental Science)
Atmospheric Deposition: In Relation to Acidification and Eutrophication (Studies in Environmental Science)
In the early 1980s, the problem of acidification was acknowledged on a governmental level in the Netherlands as posing a major environmental threat. The concern for damage to forests and ecosystems, and materials and monuments, as well as for acidification of soils and moorland pools stimulated research and policy development. Acid...
A Primer for the Monte Carlo Method
A Primer for the Monte Carlo Method

The Monte Carlo method is a numerical method of solving mathematical problems through random sampling. As a universal numerical technique, the method became possible only with the advent of computers, and its application continues to expand with each new computer generation. A Primer for the Monte Carlo Method demonstrates how practical...

Cancer Drug Resistance (Cancer Drug Discovery and Development)
Cancer Drug Resistance (Cancer Drug Discovery and Development)

Leading experts summarize and synthesize the latest discoveries concerning the changes that occur in tumor cells as they develop resistance to anticancer drugs, and suggest new approaches to preventing and overcoming it. The authors review physiological resistance based upon tumor architecture, cellular resistance based on drug transport,...

Handbook of Cell-Penetrating Peptides, Second Edition (Pharmacology and Toxicology: Basic and Clinical Aspects)
Handbook of Cell-Penetrating Peptides, Second Edition (Pharmacology and Toxicology: Basic and Clinical Aspects)

Since the first Handbook of Cell-Penetrating Peptides was prepared in 2001, the wealth of new information on the use of these peptides as transport systems has in fact served to confound the field. The constant internal change in the field of cell-penetrating peptides (CPPs) is due to recent research uncovering apparent ambiguities in...

RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

The Finite Element Method: Theory, Implementation, and Applications (Texts in Computational Science and Engineering)
The Finite Element Method: Theory, Implementation, and Applications (Texts in Computational Science and Engineering)

This book gives an introduction to the finite element method as a general computational method for solving partial differential equations approximately. Our approach is mathematical in nature with a strong focus on the underlying mathematical principles, such as approximation properties of piecewise polynomial spaces, and variational...

JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...

Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Microsoft Exchange Server 2013 High Availability
Microsoft Exchange Server 2013 High Availability

Design a highly available Exchange 2013 messaging environment using real-world examples

Overview

  • Use the easy-to-follow guidelines and tips to achieve the highest availability
  • Covers all the aspects that need to be considered before, during and after implementation of high availability
  • ...
Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy