Home | Amazing | Today | Tags | Publishers | Years | Search 
Theories of Crime Through Popular Culture
Theories of Crime Through Popular Culture

This textbook brings criminology theories to life through a wide range of popular works in film, television and video games including 13 Reasons Why, Game of Thrones, The Office, and Super Mario Bros, from a variety of contributors. It serves as an engaging and creative...

Individualized In-Vitro Fertilization (Delivering Precision Fertility Treatment)
Individualized In-Vitro Fertilization (Delivering Precision Fertility Treatment)
The increasing understanding of individual differences in response to in-vitro fertilization (IVF) treatment, resulting from genetic and ethnical differences, has increased the potential for individualized treatment for patients, resulting in improved pregnancy and live-birth outcomes. This illustrated book summarizes, and provides updates on,...
Connecting Mathematics and Mathematics Education: Collected Papers on Mathematics Education as a Design Science
Connecting Mathematics and Mathematics Education: Collected Papers on Mathematics Education as a Design Science

This open access book features a selection of articles written by Erich Ch. Wittmann between 1984 to 2019, which shows how the “design science conception” has been continuously developed over a number of decades. The articles not only describe this conception in general terms, but also demonstrate various substantial...

PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting
PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting

This pocket reference has been updated with the new PHP 8 release. It is a condensed, code-rich scripting and syntax handbook for the PHP scripting language. You won’t find any technical jargon, bloated samples, drawn-out history lessons or witty stories in this book. What you will find is a web scripting language...

Computational Methods in Synthetic Biology (Methods in Molecular Biology, 2189)
Computational Methods in Synthetic Biology (Methods in Molecular Biology, 2189)

This second edition book provides complete coverage of the computational approaches currently used in Synthetic Biology.  New chapters detail computational methods and algorithms for the design of bio-components, insight on CAD programs, analysis techniques, and distributed systems. Written in the highly...

CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)

This book presents guidelines for the design, operation and monitoring of CO2 injection in fractured carbonates, with low permeability in the rock matrix, for geological storage in permanent trapping. 

CO2 migration is dominated by fractures in formations where the hydrodynamic and geochemical effects induced by the...

Defining Mental Disorder: Jerome Wakefield and His Critics (Philosophical Psychopathology)
Defining Mental Disorder: Jerome Wakefield and His Critics (Philosophical Psychopathology)
Philosophers discuss Jerome Wakefield's influential view of mental disorder as "harmful dysfunction," with detailed responses from Wakefield himself.

One of the most pressing theoretical problems of psychiatry is the definition of mental disorder. Jerome Wakefield's proposal that mental disorder is
...
Proceedings of China SAE Congress 2019: Selected Papers (Lecture Notes in Electrical Engineering, 646)
Proceedings of China SAE Congress 2019: Selected Papers (Lecture Notes in Electrical Engineering, 646)

These proceedings gather outstanding papers presented at the China SAE Congress 2019. Featuring contributions mainly from China, the biggest carmaker as well as most dynamic car market in the world, the book covers a wide range of automotive topics and the latest technical advances in the industry. Many of the approaches included can...

Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)
Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)

This book presents a comprehensive account of the energy and environmental security perspectives of the developing countries. To address the subject comprehensively, it covers four geographically diverse clusters of developing countries from across the world. The regions particularly focused on are: South Asia, South East Asia, Sub...

Wireless Communication Electronics: Introduction to RF Circuits and Design Techniques
Wireless Communication Electronics: Introduction to RF Circuits and Design Techniques

This book is intended for senior undergraduate and graduate students as well as practicing engineers who are involved in design and analysis of radio frequency (RF) circuits.  Detailed tutorials are included on all major topics required to understand fundamental principles behind both the main sub-circuits required to design an...

Design and Development of Aerospace Vehicles and Propulsion Systems: Proceedings of SAROD 2018 (Lecture Notes in Mechanical Engineering)
Design and Development of Aerospace Vehicles and Propulsion Systems: Proceedings of SAROD 2018 (Lecture Notes in Mechanical Engineering)
This book presents selected papers presented in the Symposium on Applied Aerodynamics and Design of Aerospace Vehicles (SAROD 2018), which was  jointly organized  by Aeronautical Development Agency (the nodal agency for the design and development of combat aircraft in India),  Gas-Turbine Research Establishment (responsible for...
Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
Result Page: 3417 3416 3415 3414 3413 3412 3411 3410 3409 3408 3407 3406 3405 3404 3403 3402 3401 3400 3399 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy