Home | Amazing | Today | Tags | Publishers | Years | Search 
Mechanics of Cellular Bone Remodeling: Coupled Thermal,  Electrical, and Mechanical Field Effects
Mechanics of Cellular Bone Remodeling: Coupled Thermal, Electrical, and Mechanical Field Effects

Research on bone remodeling has resulted in much new information and has led to improvements in design and biomedical practices. Mechanics of Cellular Bone Remodeling: Coupled Thermal, Electrical, and Mechanical Field Effects presents a unified exploration of recent advances, giving readers a sound understanding of...

What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Microcontrollers: High-Performance Systems and Programming
Microcontrollers: High-Performance Systems and Programming

Focusing on the line of high-performance microcontrollers offered by Microchip, Microcontrollers: High-Performance Systems and Programming discusses the practical factors that make the high-performance PIC series a better choice than their mid-range predecessors for most systems. However, one consideration in favor of the mid-range...

Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the...

Neuroviral Infections. General Principles and DNA Viruses
Neuroviral Infections. General Principles and DNA Viruses

Viral infections of the central nervous system or neurotropic viruses are often lethal. Understanding of these diseases involves understanding the interaction between the nervous system and the immune system. This book provides in-depth information about each individual virus, the diseases they cause, and the mechanisms of spread of those...

Gay, Lesbian, Bisexual, and Transgender Civil Rights: A Public Policy Agenda for Uniting a Divided America
Gay, Lesbian, Bisexual, and Transgender Civil Rights: A Public Policy Agenda for Uniting a Divided America

This book could be aptly entitled After Marriage―What Is Next for the LGBT Community? Now that marriage is increasingly being institutionalized in many states within the United States it is quite likely that marriage will be acceptable in all 50 states (dependent upon action of the U.S. Supreme Court). What lesbian, gay, bisexual,...

GPU Pro 4: Advanced Rendering Techniques
GPU Pro 4: Advanced Rendering Techniques

GPU Pro4: Advanced Rendering Techniques presents ready-to-use ideas and procedures that can help solve many of your day-to-day graphics programming challenges. Focusing on interactive media and games, the book covers up-to-date methods for producing real-time graphics.

Section editors Wolfgang Engel,...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Managing Emotion in Design Innovation
Managing Emotion in Design Innovation

This book presents an emotion centered research framework titled "emoha" for design innovation. It defines emoha and underlines the importance of the developed framework in culturalization of technology and thereby design innovation. The book explains the detailed research on product styling which leads to the creation of...

Optical Coding Theory with Prime
Optical Coding Theory with Prime

Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory—until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one...

Contemporary High Performance Computing: From Petascale toward Exascale
Contemporary High Performance Computing: From Petascale toward Exascale

Contemporary High Performance Computing: From Petascale toward Exascale focuses on the ecosystems surrounding the world’s leading centers for high performance computing (HPC). It covers many of the important factors involved in each ecosystem: computer architectures, software, applications, facilities, and sponsors.

...
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Result Page: Previous 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy