|
|
|
|
|
Algorithms for VLSI Physical Design Automation, Third EditionAlgorithms for VLSI Physical Design Automation, Third Edition covers all aspects of physical design. The book is a core reference for graduate students and CAD professionals. For students, concepts and algorithms are presented in an intuitive manner. For CAD professionals, the material presents a balance of theory and practice. An extensive... | | Periodontal Therapy: Clinical Approaches and Evidence of Success
A comprehensive review of contemporary periodontics in which clinicians and investigators offer solid treatment options and clinical evidence. The 26 chapters begin with an introduction to the essentials of goal-oriented treatment planning and a discussion of the treatment of medically compromised and juvenile patients, explaining the latest... | | Unix UnleashedUnix Unleashed, Third Edition is written with the power user and system administrator in mind. This book will help the reader understand the nuances of the major Unix variants including SVR4, HP-UX, Solaris, AIX, BSD, IRIX, SunOS, and Linux. It will help the reader decide which Unix shell works best for their particular situation. Other topics such... |
|
Green's Functions for Solid State PhysicistsThis volume shows how the analytic properties in the complex energy plane of the Green's functions of many particle systems account for the physical effects (level, shifts, damping, instabilities) characteristic of interacting systems. It concentrates on general physical principles and, while it does not discuss experiments in detail, includes... | | | | Special Edition Using LinuxLinux is a significant force in the server room and the desktop, delivering reliability, ease of installation and administration, high performance, security, and robust applications. Special Edition Using Linux 6E is written to the just-released 2.4.x kernel and includes the following topics: installation and configuration of Red Hat Linux, Caldera... |
|
Java Cryptography (Java Series)Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity... | | | | |
|
|
Result Page: Previous 18 19 20 21 22 23 24 25 26 27 Next |