Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Psychiatry today is a barren tundra, writes medical historian Edward Shorter, where drugs that don't work are used to treat diseases that don't exist. In this provocative volume, Shorter illuminates this dismal landscape, in a revealing account of why psychiatry is "losing ground" in the struggle to treat depression.

...
Mid-Ocean Ridges
Mid-Ocean Ridges

The world's mid-ocean ridges form a single, connected global ridge system that is part of every ocean, and is the longest mountain range in the world. Geologically active, mid-ocean ridges are key sites of tectonic movement, intimately involved in seafloor spreading. This coursebook presents a multidisciplinary approach to the science of...

Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)

Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians,...

Krishna's Lineage: The Harivamsha of Vyasa's Mahabharata
Krishna's Lineage: The Harivamsha of Vyasa's Mahabharata
Forming the final part of the Sanskrit Mahabharata, the Harivamsha's main business is to supply narrative details about the great god Vishnu's avatar Krishna Vasudeva, who has been a comparatively minor character in the previous parts of the Mahabharata, despite having taken centre stage in the Bhagavad...
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general...

Project Management for Construction: Fundamental Concepts for Owners, Engineers, Architects, and Builders
Project Management for Construction: Fundamental Concepts for Owners, Engineers, Architects, and Builders

This book is provided on the worldwide web as a service to the community of practitioners and students. Reproduction for educational purposes is permitted with appropriate citation. If you find this work helpful or have suggestions for additions or corrections, please email Chris Hendrickson: cth@cmu.edu. A hardcopy Instructor's Manual with...

Guide to RISC Processors: for Programmers and Engineers
Guide to RISC Processors: for Programmers and Engineers
Popular processor designs can be broadly divided into two categories: Complex Instruction
Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant
processor in the PC market, Pentium, belongs to the CISC category. However, the recent
trend is to use the RISC designs. Even Intel has moved from CISC to RISC
...
Electroactive Polymers for Robotic Applications: Artificial Muscles and Sensors
Electroactive Polymers for Robotic Applications: Artificial Muscles and Sensors
Electroactive polymers (EAPs) respond to electrical stimulation with large deformations. They are dynamic actuators which have attracted attention from an interdisciplinary audience of engineers and scientists. An enabling EAP technology is emerging which attempts to imitate the properties of natural muscle and which, as a result, can perform a...
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Learn How To Convert Web Data Into Web Knowledge

This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...

Foundations of GTK+ Development (Expert's Voice in Open Source)
Foundations of GTK+ Development (Expert's Voice in Open Source)
GTK+ is one of the most influential graphical toolkits for the Linux operating system. It is the technology upon which the GNOME and XFCE desktop environments are based, and it's crucial to have clear understanding of its complexities to build even a simple Linux desktop application. Foundations of GTK+ Development guides you through these...
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
ASP .NET Kick Start
ASP .NET Kick Start

This is an introductory book on creating ASP.NET Web applications using Microsoft Visual Studio .NET. The focus of this book is the Visual Studio .NET development environment. You will learn how to take full advantage of the features of the Visual Studio .NET development environment to quickly develop professional Web...

unlimited object storage image
Result Page: 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy