Home | Amazing | Today | Tags | Publishers | Years | Search 
Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Nutrient-Gene Interactions in Health and Disease (Modern Nutrition)
Nutrient-Gene Interactions in Health and Disease (Modern Nutrition)

We have come to realize that optimal nutrient intake is determined by very specific genetic messages. This realization has led to an entirely new approach to understanding nutrition – the exploration of nutrient effects on gene expression.

Edited by leading experts in the field, Nutrient–Gene Interactions in Health...

Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
Neural Prostheses for Restoration of Sensory and Motor Function (Frontiers in Neuroscience)
Neural Prostheses for Restoration of Sensory and Motor Function (Frontiers in Neuroscience)

The prospect of interfacing the nervous system with electronic devices to stimulate or record from neural tissue suggests numerous possibilities in the field of neuroprosthetics. While the creation of a "six million dollar man" may still be far into the future, neural prostheses are rapidly becoming viable theories for a broad range...

Circadian Physiology, Second Edition
Circadian Physiology, Second Edition

While the first edition of the critically acclaimed and highly popular Circadian Physiologyoffered a concise but rigorous review of basic and applied research on circadian rhythms, this newest edition provides educators with the primary textbook they need to support a course on this cutting-edge topic. Maintaining the same accessible...

Weiner's Pain Management: A Practical Guide for Clinicians (Boswell, Weiner's Pain Management)
Weiner's Pain Management: A Practical Guide for Clinicians (Boswell, Weiner's Pain Management)

This seventh edition of a bestseller has been totally revised and updated, making this the most comprehensive rewrite in the book's long and distinguished history. It includes new chapters, new sections and section editors, and new contributors. Offering an interdisciplinary approach to pain management, the book delivers a scholarly...

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities...
Supervised and Unsupervised Pattern Recognition: Feature Extraction and Computational Intelligence
Supervised and Unsupervised Pattern Recognition: Feature Extraction and Computational Intelligence

There are many books on neural networks, some of which cover computational intelligence, but none that incorporate both feature extraction and computational intelligence, as Supervised and Unsupervised Pattern Recognition does. This volume describes the application of a novel, unsupervised pattern recognition scheme to the classification of...

Multiagent Robotic Systems (International Series on Computational Intelligence)
Multiagent Robotic Systems (International Series on Computational Intelligence)
Liu and Wu describe the major developments and technical issues related to learning, adaptation, and self-organization in multiagent robotic systems … the list of references is comprehensive … A good resource for researchers on robotic systems, which may serve as a course resource for graduate students.
-CHOICE
...
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
A Practical Approach to WBEM/CIM Management
A Practical Approach to WBEM/CIM Management

System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,...

Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards

Consisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a...

Result Page: Previous 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy