Home | Amazing | Today | Tags | Publishers | Years | Search 
The Ubiquitous Roles of Cytochrome P450 Proteins: Metal Ions in Life Sciences
The Ubiquitous Roles of Cytochrome P450 Proteins: Metal Ions in Life Sciences

Helmut Sigel, Astrid Sigel and Roland K.O. Sigel, in close cooperation with John Wiley & Sons launch a new Series “Metal Ions in Life Sciences”.

There exists a whole range of books on Cytochromes P450, but none with the focus of this volume. This new volume in the Series concentrates on current hot topics in the...

Small Antenna Design (Communications Engineering Series)
Small Antenna Design (Communications Engineering Series)

As wireless devices and systems get both smaller and more ubiquitous, the demand for effective but small antennas is rapidly increasing. This book will describe the theory behind effective small antenna design and give design techniques and examples for small antennas for different operating frequencies. Design techniques are given for the...

Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

Excel 2010 for Educational and Psychological Statistics: A Guide to Solving Practical Problems
Excel 2010 for Educational and Psychological Statistics: A Guide to Solving Practical Problems

Excel has become an important and nearly ubiquitous classroom and office resource for students and practitioners who are faced with solving statistical problems on an everyday basis. Despite this, there has yet to emerge a truly practical, “how-do-I-do-it” manual that teaches the various applications and...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon...

Designing the Internet of Things
Designing the Internet of Things

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool...

Too Good To Fail: Creating Marketplace Value from the World's Brightest Minds (Management for Professionals)
Too Good To Fail: Creating Marketplace Value from the World's Brightest Minds (Management for Professionals)

Too Good to Fail: Creating Marketplace Value form the World’s Brightest Minds is a guide for senior managers seeking to address their need to rapidly develop globally innovative products with constrained R&D budgets. It creates a practical strategy to address and bring together, for the first time, the emergence of open...

Ways of Thinking, Ways of Seeing: Mathematical and other Modelling in Engineering and Technology (Automation, Collaboration, & E-Services)
Ways of Thinking, Ways of Seeing: Mathematical and other Modelling in Engineering and Technology (Automation, Collaboration, & E-Services)

This fascinating book examines some of the characteristics of technological/engineering models that are likely to be unfamiliar to those who are interested primarily in the history and philosophy of science and mathematics, and which differentiate technological models from scientific and mathematical ones. Themes that are highlighted...

Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)

Over the past few decades the powerful methods of statistical physics and Euclidean quantum field theory have moved closer together, with common tools based on the use of path integrals. The interpretation of Euclidean field theories as particular systems of statistical physics has opened up new avenues for understanding strongly coupled...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Design Literacy: Understanding Graphic Design
Design Literacy: Understanding Graphic Design
Author and design expert Steven Heller has revisited and revised the popular classic Design Literacy by revising many of the thoughtful essays from the original and mixing in thirty-two new works. Each essay offers a taste of the aesthetic, political, historical, and personal issues that have engaged designers from the late...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy