Home | Amazing | Today | Tags | Publishers | Years | Search 
Cosmetic Formulation: Principles and Practice
Cosmetic Formulation: Principles and Practice

Cosmetics are the most widely applied products to the skin and include creams, lotions, gels and sprays. Their formulation, design and manufacturing ranges from large cosmetic houses to small private companies. This book covers the current science in the formulations of cosmetics applied to the skin. It includes basic formulation,...

Dose, Benefit, and Risk in Medical Imaging (Imaging in Medical Diagnosis and Therapy)
Dose, Benefit, and Risk in Medical Imaging (Imaging in Medical Diagnosis and Therapy)

This timely overview of dose, benefit, and risk in medical imaging explains to readers how to apply this information for informed decision-making that improves patient outcomes. The chapters cover patient and physician perspectives, referral guidelines, appropriateness criteria, and quantifying medical imaging benefits. The authors...

Theory of User Engineering
Theory of User Engineering

This book outlines the new concept of user engineering and covers the diversity of users, along with the business process that includes the design and the user’s experience processes. Although the concept of user experience (UX) has become popular, the definition and the methodology are still ambiguous. User engineering is similar to...

Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

Pixel Art for Game Developers
Pixel Art for Game Developers

Is the art for your video game taking too long to create? Learning to create Pixel Art may be the answer to your development troubles. Uncover the secrets to creating stunning graphics with Pixel Art for Game Developers. The premier how-to book on Pixel Art and Pixel Art software, it focuses on the universal principles of the...

Multiscale Theory of Composites and Random Media
Multiscale Theory of Composites and Random Media

This is the first book to introduce Green-function-based multiscale theory and the corresponding finite element method, which are readily applicable to composites and random media. The methodology is considered to be the one that most effectively tackles the uncertainty of stress propagation in complex heterogeneities of random...

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective...

Cloud Computing Security: Foundations and Challenges
Cloud Computing Security: Foundations and Challenges
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas...
Handbook of Drug Metabolism, Third Edition (Drugs and the Pharmaceutical Sciences)
Handbook of Drug Metabolism, Third Edition (Drugs and the Pharmaceutical Sciences)

This book continues to be the definitive reference on drug metabolism with an emphasis on new scientific and regulatory developments. It has been updated based on developments that have occurred in the last 5 years, with new chapters on large molecules disposition, stereo-selectivity in drug metabolism, drug transporters and...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding
Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding

Why should you, a competent software developer or programmer, care about your own brand? After all, it’s not like you're an actor or musician.

In fact, as Success in Programming: How to Gain Recognition, Power, and Influence Through Personal Branding demonstrates in...

Using the C++ Standard Template Libraries
Using the C++ Standard Template Libraries

Using the C++ Standard Template Libraries is a contemporary treatment that teaches the generic programming capabilities that the C++ 14 Standard Library provides. In this book, author Ivor Horton explains what the class and function templates available with C++ 14 do, and how to use them in a practical context.

You'll...

Result Page: Previous 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy