Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Flower Development: Methods and Protocols (Methods in Molecular Biology)
Flower Development: Methods and Protocols (Methods in Molecular Biology)

In Flower Development: Methods and Protocols, researchers in the field detail protocols for  experimental approaches that are currently used to study the formation of flowers, from genetic methods and phenotypic analyses, to genome-wide experiments, modeling, and system-wide approaches. Written in the highly successful Methods...

Computer Network Security and Cyber Ethics, 4th ed.
Computer Network Security and Cyber Ethics, 4th ed.

In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions...

Beginning Google Glass Development
Beginning Google Glass Development

Beginning Google Glass Development is your number one resource for learning how to develop for Google Glass--the paradigm-shifting mobile computing platform taking the world by storm now and for years to come. Mobile developers have always had to think for the future, and right now that means getting started with Google Glass.

...
MariaDB Cookbook
MariaDB Cookbook

A practical cookbook, filled with advanced recipes , and plenty of code and commands used for illustration,which will make your learning curve easy and quick.

This book is for anyone who wants to learn more about databases in general or MariaDB in particular. Some familiarity with SQL databases is assumed, but the recipes are
...

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to...

Building Mapping Applications with QGIS
Building Mapping Applications with QGIS

Create your own sophisticated applications to analyze and display geospatial information using QGIS and Python

About This Book

  • Make use of the geospatial capabilities of QGIS within your Python programs
  • Build complete standalone mapping applications based on QGIS and Python
  • ...
Lead Compounds from Medicinal Plants for the Treatment of Neurodegenerative Diseases (Pharmaceutical Leads from Medicinal Plants)
Lead Compounds from Medicinal Plants for the Treatment of Neurodegenerative Diseases (Pharmaceutical Leads from Medicinal Plants)

Lead Compounds from Medicinal Plants for the Treatment of Neurodegenerative Diseases is the second volume in the series, Pharmaceutical Leads from Medicinal Plants. This book includes key pharmacological and chemical evidence to support the selection of promising pre-clinical candidates for the treatment of neurodegenerative...

Computational and Experimental Fluid Mechanics with Applications to Physics, Engineering and the Environment
Computational and Experimental Fluid Mechanics with Applications to Physics, Engineering and the Environment

The book presents a collection of selected papers from the I Workshop of the Venezuelan Society of Fluid Mechanics held on Margarita Island, Venezuela from November 4 to 9, 2012. Written by experts in their respective fields, the contributions are organized into five parts: - Part I Invited Lectures, consisting of full-length technical papers...

Parallel Programming with Python
Parallel Programming with Python

Develop efficient parallel systems using the robust Python environment

About This Book

  • Demonstrates the concepts of Python parallel programming
  • Boosts your Python computing capabilities
  • Contains easy-to-understand explanations and plenty of examples

Who...

Mastering Lumion 3D
Mastering Lumion 3D

Master the art of creating real-time 3D architectural visualizations using Lumion 3D

About This Book

  • Create professional architectural visualizations in seconds using real-time technology
  • Learn the inbuilt Lumion effects to enhance your project to an expert level
  • Covers...
Integrating Routing Decisions in Public Transportation Problems (Springer Optimization and Its Applications)
Integrating Routing Decisions in Public Transportation Problems (Springer Optimization and Its Applications)

This book treats three planning problems arising in public railway transportation planning: line planning, timetabling, and delay management, with the objective to minimize passengers’ travel time. While many optimization approaches simplify these problems by assuming that passengers’ route choice is independent of the solution,...

Getting Started with Red Hat Enterprise Virtualization
Getting Started with Red Hat Enterprise Virtualization

Leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud

About This Book

  • Build an agile, secure, and highly scalable virtualization foundation for your enterprise Linux and Windows workloads
  • Explore how Red Hat Enterprise Virtualization positions itself...
unlimited object storage image
Result Page: Previous 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 Next 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy