Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

The International Dictionary of Artificial Intelligence
The International Dictionary of Artificial Intelligence
THE INTERNATIONAL DICTIONARY OF ARTIFICIAL INTELLIGENCE

Anticipating the needs of professionals and researchers alike, this Dictionary is the first up-to-date reference volume on a discipline of ever-growing importance. Artificial intelligence is rapidly becoming the foundation discipline for thousands of new applications and will have...

Color Image Processing: Methods and Applications
Color Image Processing: Methods and Applications
Over the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale...
Phase Behavior of Polymer Blends (Advances in Polymer Science)
Phase Behavior of Polymer Blends (Advances in Polymer Science)
The observation that blending existing polymers can produce new and improved materials with the beneficial features of each component has focused attention on understanding the phase behavior of polymer blends because the resulting composites may form homogeneous phases or may be phase separated with a particular desirable morphology. While...
Quick CORBA 3
Quick CORBA 3
This book collects descriptions of the Object Management Group’s most powerful new CORBA and modeling specifications into a single volume. These specifications combine to give CORBA the capabilities it needs to support advanced Internet and enterprise computing. It includes almost all of the ten specifications originally labeled CORBA 3 (most...
Process Algebra for Parallel and Distributed Processing (Chapman & Hall / Crc Computational Science)
Process Algebra for Parallel and Distributed Processing (Chapman & Hall / Crc Computational Science)
Despite the importance of applications of process algebras for the success of the field, [related publications] concentrate strongly on the theoretical achievements. This shortcoming is compensated for in a splendid way by this book, which brings together the state of the art in research on applications of process algebras.
—From the
...
Fundamentals Of Robotic Grasping And Fixturing (Series on Manufacturing Systems and Technology)
Fundamentals Of Robotic Grasping And Fixturing (Series on Manufacturing Systems and Technology)

This book provides a fundamental knowledge of robotic grasping and fixturing (RGF) manipulation. For RGF manipulation to become a science rather than an art, the content of the book is uniquely designed for a thorough understanding of the RGF from the multifingered robot hand grasp, basic fixture design principle, and evaluating and planning...

Chemical Engineering Design, Fourth Edition: Chemical Engineering Volume 6
Chemical Engineering Design, Fourth Edition: Chemical Engineering Volume 6
Chemical Engineering Design is one of the best-known and widely adopted texts available for students of chemical engineering. It deals with the application of chemical engineering principles to the design of chemical processes and equipment. Revised throughout, the fourth edition covers the latest aspects of process design, operations, safety, loss...
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Fourier Analysis: An Introduction (Princeton Lectures in Analysis)
Fourier Analysis: An Introduction (Princeton Lectures in Analysis)

This first volume, a three-part introduction to the subject, is intended for students with a beginning knowledge of mathematical analysis who are motivated to discover the ideas that shape Fourier analysis. It begins with the simple conviction that Fourier arrived at in the early nineteenth century when studying problems in the physical...

Pharmacodynamic Basis of Herbal Medicine, Second Edition
Pharmacodynamic Basis of Herbal Medicine, Second Edition

Continuing in the tradition of the acclaimed first edition, Pharmacodynamic Basis of Herbal Medicine, Second Edition examines in extensive detail the physiologic effects of complimentary and alternative therapies, foods, supplements, vitamins, and traditional herbal remedies. The author considers the site, mode, and mechanism of action...

unlimited object storage image
Result Page: 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy