Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Simulation Methods in Theoretical Physics
Computer Simulation Methods in Theoretical Physics

The new and exciting field of computational science, and in particular sim- ulational science, has seen rapid change since the first edition of this book came out. New methods have been found, fresh points of view have emerged, and features hidden so far have been uncovered. Almost all the methods presented in the first addition have...

Human Retroviral Infections: Immunological and Therapeutic Control
Human Retroviral Infections: Immunological and Therapeutic Control
The mechanisms of disease production by infectious agents are presently the focus of an unprecedented flowering of studies. The field has undoubtedly received impetus from the considerable advances recently made in the understanding of the structure, biochemistry, and biology of viruses, bacteria, fungi, and other parasites....
Iminosugars: From Synthesis to Therapeutic Applications
Iminosugars: From Synthesis to Therapeutic Applications
The field of iminosugars is a very exciting area of research. These carbohydrate mimetics were first imagined and synthesized by chemists in the 1960s before being isolated from Nature a few years later. Since the discovery of their biological activity as potent glycosidase inhibitors in the 1970s, iminosugars have been the subject...
Ultimate Journey
Ultimate Journey

In 1958, a successful businessman named Robert Mornroe began to have experiences that drastically altered his life.  Unpredictably, and without his willing it, Monroe found himself leaving his physical body to travel via a "second body" to locales far removed from the physical and spiritual realities of his life. He was...

Search Analytics for Your Site
Search Analytics for Your Site

Any organization that has a searchable web site or intranet is sitting on top of hugely valuable and usually under-exploited data: logs that capture what users are searching for, how often each query was searched, and how many results each query retrieved. Search queries are gold: they are real data that show us exactly what users are...

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
THE ROLE OF a user experience consultant, and specifi cally the user-centered design process, is to help guide and shape the development of products and services based on what the user understands and requires. To do this, the consultant needs to be a facilitator and communicator, ensuring that the right user information is...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Windows 7 Annoyances: Tips, Secrets, and Solutions
Windows 7 Annoyances: Tips, Secrets, and Solutions

They say no one should see how sausage or laws get made, and I feel the same
is true for software.

Imagine a windowless room in a nondescript office building. Inoffensive tan carpet lines the floors, fluorescent lights hum softly overhead, and 20 seated Microsoft employees flank a rectangular folding table in the center of...

Beyond Photoshop: Advanced techniques integrating Photoshop with Illustrator, Poser, Painter, Cinema 4D and ZBrush
Beyond Photoshop: Advanced techniques integrating Photoshop with Illustrator, Poser, Painter, Cinema 4D and ZBrush

In his best-selling book Creative Photoshop, award-winning artist Derek Lea previously revealed to the digital art world his secrets for creating stunning, sophisticated works of art using Photoshop. Now, he goes one step further in this all-new book to demonstrate his unique methods for using Photoshop in conjunction with other software...

Breakthrough!: How the 10 Greatest Discoveries in Medicine Saved Millions and Changed Our View of the World
Breakthrough!: How the 10 Greatest Discoveries in Medicine Saved Millions and Changed Our View of the World

"A wonderfully clear account of the great moments in medicine and a powerful reminder of the possibility of improvement in the fight against illness."  -–Matt Ridley, author of Genome

 

10 World-Changing Revolutions...

The Neurobiology of Olfaction (Frontiers in Neuroscience)
The Neurobiology of Olfaction (Frontiers in Neuroscience)

Comprehensive Overview of Advances in Olfaction

The common belief is that human smell perception is much reduced compared with other mammals, so that whatever abilities are uncovered and investigated in animal research would have little significance for humans. However, new evidence from a variety of sources...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy