Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C: How to Program, 7th Edition
C: How to Program, 7th Edition

For introductory courses in C Programming. Also for courses in Programming for Engineers, Programming for Business, and Programming for Technology.

The Deitels' How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Using the...

CURRENT Medical Diagnosis and Treatment 2017 (Lange)
CURRENT Medical Diagnosis and Treatment 2017 (Lange)

This #1 annual internal medicine and clinical practice guide turns the latest research into improved patient outcomes – now fully updated and revised.

Handbook of Time Series Analysis, Signal Processing, and Dynamics
Handbook of Time Series Analysis, Signal Processing, and Dynamics

It is hoped that this book will serve both as a text in time-series analysis and signal processing and as a reference book for research workers and practitioners. Timeseries analysis and signal processing are two subjects which ought to be treated as one; and they are the concern of a wide range of applied disciplines including statistics,...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Mobile robots are widely applied in a range of applications from transportation, surveillance through to health care. In all these applications it is clearly important to be able to analyse and control the performance of the mobile robot and it is therefore surprising that formalised methods to achieve this are not readily available. This book...
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
As autonomous robots expand into the service domain, new solutions to the challenge of operating in domestic environments must be developed. Widespread adoption of service robots demands high robustness to environmental change and operational wear, and minimal reliance on application specific knowledge. As such, rich sensing modalities such as...
Patterns of Enterprise Application Architecture
Patterns of Enterprise Application Architecture

The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented....

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Result Page: 141 140 139 138 137 136 135 134 133 132 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy