Home | Amazing | Today | Tags | Publishers | Years | Search 
SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices
SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure Devices
What seems routine today was not always so. The field of Si-based heterostructures rests solidly on the shoulders of materials scientists and crystal growers, those purveyors of the semiconductor “black arts” associated with the deposition of pristine films of nanoscale dimensionality onto enormous Si wafers with near infinite...
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
Information Technology Policy and the Digital Divide: Lessons for Developing Countries
The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations...
Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
Security Software Development: Assessing and Managing Security Risks
Security Software Development: Assessing and Managing Security Risks
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development...
Essential Software Testing: A Use-Case Approach
Essential Software Testing: A Use-Case Approach
Much has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case...
iPhone For Dummies (Computer/Tech)
iPhone For Dummies (Computer/Tech)
The iPhone 3G is here! You’ll want to make the most of it, and iPhone For Dummies, 2nd Edition is ready to help. Master the multitouch interface, send text messages, enjoy rich-HTML e-mail, use GPS maps, and more, with this full-color guide to show you how!

Edward C. Baig and “Dr. Mac” Bob LeVitus, two giants of...

Network Security: Know It All
Network Security: Know It All
All of the elements of network security together in a single volume written by the best and brightest experts in the field!

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
...
Ophthalmology (Clinical Sciences)
Ophthalmology (Clinical Sciences)
Like other medical specialties, ophthalmology undergoes constant enormous development in all its subspecialties. Assembling essential information is therefore an ever-recurring task, which needs to be done in various ways and for various target groups. The specialty of ophthalmology owes its development in recent years to numerous technical...
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
The Method of Moments in Electromagnetics
The Method of Moments in Electromagnetics
Responding to the need for a clear, up-to-date introduction to the field, The Method of Moments in Electromagnetics explores surface integral equations in electromagnetics and presents their numerical solution using the method of moments (MOM) technique. It provides the numerical implementation aspects at a nuts-and-bolts level...
One Jump Ahead: Computer Perfection at Checkers
One Jump Ahead: Computer Perfection at Checkers
The new edition of this extraordinary book depicts the creation of the world champion checkers computer program, Chinook. In only two years, Chinook had become a worthy opponent to the world champion, and within four years had defeated all the world's top human players. Jonathan Schaeffer, the originator and leader of the Chinook team, details the...
Deconstructing the Elements with 3ds Max, Third Edition: Create natural fire, earth, air and water without plug-ins
Deconstructing the Elements with 3ds Max, Third Edition: Create natural fire, earth, air and water without plug-ins

ALL NEW TUTORIALS IN THIS NEW 3RD EDITION provide a unique and rigorous approach to teaching 3d artists the art and techniques of creating CG environments with the latest version of 3ds Max (200,000+ users).

3ds Max is the leading 3D modeling, animation, and rendering solution for artists, schools, and production
...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy