Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Birth of Numerical Analysis
The Birth of Numerical Analysis

The 1947 paper by John von Neumann and Herman Goldstine, Numerical Inverting of Matrices of High Order (Bulletin of the AMS, Nov. 1947), is considered as the birth certificate of numerical analysis. Since its publication, the evolution of this domain has been enormous. This book is a unique collection of contributions by researchers who have...

Pharmaceutical Data Mining: Approaches and Applications for Drug Discovery
Pharmaceutical Data Mining: Approaches and Applications for Drug Discovery

Leading experts illustrate how sophisticated computational data mining techniques can impact contemporary drug discovery and development

In the era of post-genomic drug development, extracting and applying knowledge from chemical, biological, and clinical data is one of the greatest challenges facing the pharmaceutical industry....

Schaum's 3,000 Solved Problems in Calculus
Schaum's 3,000 Solved Problems in Calculus

Facing Tough Test Questions? Missed Lectures? Not Enough Time?

Fortunately for you, there's Schaum's.

More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Solved...

TOAD Handbook (2nd Edition)
TOAD Handbook (2nd Edition)

TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to...

Cryptographic  Boolean  Functions and Applications
Cryptographic Boolean Functions and Applications
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).

Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean
...
Non-Binary Error Control Coding for Wireless Communication and Data Storage
Non-Binary Error Control Coding for Wireless Communication and Data Storage

Comprehensive introduction to non-binary error-correction coding techniques

Non-Binary Error Control Coding for Wireless Communication and Data Storage explores non-binary coding schemes that have been developed to provide an alternative to the Reed – Solomon codes, which are expected to become unsuitable for...

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud

If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.


While analysts hotly debate the advantages and risks of cloud
...
So What?: How to Communicate What Really Matters to Your Audience
So What?: How to Communicate What Really Matters to Your Audience

Supercharge your success by answering the one question everyone cares about, So What?: How to Communicate What Really Matters to Your Audience contains practical techniques, examples, and exercises proven with thousands of winning salespeople, straight from Mark Magnacca, one of the world’s leading sales...

Food Chemistry
Food Chemistry
For more than two decades, this work has remained the leading advanced textbook and easy-to-use reference on food chemistry and technology. Its fourth edition has been extensively re-written and enlarged, now also covering topics such as BSE detection or acrylamide. Food allergies, alcoholic drinks, or phystosterols are now treated more...
Linux Bible 2009 Edition: Boot up Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and more
Linux Bible 2009 Edition: Boot up Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and more
Linux Bible 2009 Edition is here to open your eyes to what Linux is, where it came from, and where it’s going. But, most of all, the book is here to hand you Linux and help you get started. Because Linux is the operating system of free speech and free choice, Linux Bible gives you choices in selecting the Linux that is right for you.
...
Internet Programming
Internet Programming
So far, we have described many features of the Java programming language that are broadly equivalent to those in other programming languages. This unit marks a change in that we will consider some of the more distinctive aspects of Java, which make it very popular for internet-related programming. We will describe how to use Java to program...
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)

Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear...

Result Page: Previous 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy