Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Targeting Treatment of Soft Tissue Sarcomas (Cancer Treatment and Research)
Targeting Treatment of Soft Tissue Sarcomas (Cancer Treatment and Research)
The last decade we have witnessed a major change in the development of new techniques and agents for the treatment of cancer in general, and for soft tissue sarcomas in particular. The important achievements of molecular biology research have changed the landscape markedly. Increasingly subtypes of soft tissue sarcomas are shown...
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Android Hardware Interfacing with the BeagleBone Black
Android Hardware Interfacing with the BeagleBone Black

Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black

About This Book

  • Design custom apps that interact with the outside world via BeagleBone Black
  • Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Machine Learning Using R: With Time Series and Industry-Based Use Cases in R
Machine Learning Using R: With Time Series and Industry-Based Use Cases in R

Examine the latest technological advancements in building a scalable machine-learning model with big data using R. This second edition shows you how to work with a machine-learning algorithm and use it to build a ML model from raw data. You will see how to use R programming with TensorFlow, thus avoiding the effort of learning Python...

Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras

Build, scale, and deploy deep neural network models using the star libraries in Python

Key Features

  • Delve into advanced machine learning and deep learning use cases using Tensorflow and Keras
  • Build, deploy, and scale end-to-end deep neural network models in a production...
Linear Fresnel Reflector Systems for Solar Radiation Concentration: Theoretical Analysis, Mathematical Formulation and Parameters’ Computation using MATLAB
Linear Fresnel Reflector Systems for Solar Radiation Concentration: Theoretical Analysis, Mathematical Formulation and Parameters’ Computation using MATLAB
This book offers a complete guide to designing Linear Fresnel Reflector Systems for concentrating solar radiation. It includes theoretical analyses, computational tools and mathematical formulae to facilitate the development, design, construction and application of these systems. In addition, the book presents a concise yet thorough...
C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before.

New to this...

HTTP Pocket Reference : Hypertext Transfer Protocol
HTTP Pocket Reference : Hypertext Transfer Protocol

This book describes HTTP, the Hypertext Transfer Protocol. It provides a high level description of how the protocol works, along with reference information on client requests and server responses. Included are dumps of HTTP transactions, as well as tabular data that summarizes most of the standardized parameters used in...

Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
Sams Teach Yourself Microsoft Office Access 2003 in 24 Hours
In just 24 lessons of one hour or less, you will be able to work with and design your own Access databases. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Access 2003 and all its components from the ground up.

Welcome to Sams Teach Yourself Microsoft Office
...
Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
unlimited object storage image
Result Page: 1315 1314 1313 1312 1311 1310 1309 1308 1307 1306 1305 1304 1303 1302 1301 1300 1299 1298 1297 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy