Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves

This is the story of a few human genes and how we discovered what these genes do. We each have around 25,000 genes, but the genes in this story are those that vary the most from person to person. These genes--called compatibility genes--are, in effect, a molecular signature that distinguishes each of us as individuals. Davis tells the...

Levison's Textbook for Dental Nurses
Levison's Textbook for Dental Nurses

In this brand-new 11th edition of the original, best-selling book, Levison's Textbook for Dental Nurses gives you the same great comprehensive coverage of everything students preparing for their dental nurse qualification need to know, and also includes for the first time:

  • A new look and feel, packed with illustrations...
Handbook of Food Factory Design
Handbook of Food Factory Design

Food manufacturing has evolved over the centuries from kitchen industries to modern, sophisticated production operations. A typical food factory includes the food processing and packaging lines, the buildings and exterior landscaping, and the utility-supply and waste-treatment facilities. As a single individual is unlikely to possess all the...

PySide GUI Application Development
PySide GUI Application Development

Newbies to GUI programming in Python will find this book indispensable. As well as the basic concepts, you'll be taught PySide in detail through practical instructions and create your own applications with customized widgets and dialogs.

Overview

  • Designed for beginners to help them get started with...
Designing SCADA Application Software: A Practical Approach
Designing SCADA Application Software: A Practical Approach

Automation systems, often referred to as SCADA systems, involve programming at several levels; these systems include computer type field controllers that monitor and control plant equipment such as conveyor systems, pumps, and user workstations that allow the user to monitor and control the equipment through color graphic displays. All of the...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Handbook of Finite Fields (Discrete Mathematics and Its Applications)
Handbook of Finite Fields (Discrete Mathematics and Its Applications)

Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and...

Genetic Damage in Human Spermatozoa (Advances in Experimental Medicine and Biology)
Genetic Damage in Human Spermatozoa (Advances in Experimental Medicine and Biology)

There are several types of damage that can be found in the male gamete. Genetic damage in spermatozoa can originate during spermatogenesis, or it can originate during transit in both male and female genital tracts. Damage can also be due to ageing, environmental or iatrogenic conditions, as well as to the protocols to cryopreserve and to...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
The Warren Buffett Way
The Warren Buffett Way

Warren Buffett is the most famous investor of all time and one of today’s most admired business leaders. He became a billionaire and investment sage by looking at companies as businesses rather than prices on a stock screen. The first two editions of The Warren Buffett Way gave investors their first in-depth look at the...

Programming with Microsoft Visual Basic 2012
Programming with Microsoft Visual Basic 2012

PROGRAMMING WITH MICROSOFT VISUAL BASIC 2012, 6E by best-selling author Diane Zak is the ideal choice for your introduction to programming. Readers learn to master the basics of effective programming as they work through a wealth of hands-on applications in this book's engaging real-world setting. Numerous learning features address...

Methods for analysis of Golgi complex function, Volume 118: Methods in Cell Biology
Methods for analysis of Golgi complex function, Volume 118: Methods in Cell Biology

This new volume of Methods in Cell Biology looks at methods for analyzing of golgi complex function. Chapters cover such topics as in vitro reconstitution systems, fluorescence-based analysis of trafficking in mammalian cells and high content screening. With cutting-edge material, this comprehensive collection is intended to guide...

Result Page: Previous 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy