Home | Amazing | Today | Tags | Publishers | Years | Search 
Stroke Prevention
Stroke Prevention
The treatment of stroke remains ineffective, and prevention is the key issue for this common disease. Norris and Hachinski have recruited an international group of experts to provide a comprehensive, critical review of the evidence on the primary and secondary prevention of cerebrovascular disease and to translate this information into clinical...
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems
The UMTS Network and Radio Access Technology: Air Interface Techniques for Future Mobile Systems
The UMTS Network and Radio Access Technology covers all the key aspects of UMTS and its implementation from both the engineering design and the operator and service providers' point of view. It addresses the essential tasks involved in UMTS network deployment in new regions and within existing 2G networks. Presenting solutions for the...
Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)
Handbook of Vitamins, 3rd Edition (Clinical Nutrition in Health and Disease, No. 3)

Features a comprehensive summary of the chemical, physiological, and nutritional relationships of all recognized vitamins!

Maintaining the standards of excellence set forth in the previous editions, the Handbook of Vitamins, Third Edition presents a thorough examination of the fundamental characteristics, functions, and roles
...

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

We are the technologically inclined and normality spurned, or at least, this is how we perceive (or perhaps want) things to be. We are adept at dealing with machines, and manipulating things. Everything comes easy to us, and when things always come to you without any failure, you begin to feel nothing matters… that the...

Electrons and Phonons: The Theory of Transport Phenomena in Solids
Electrons and Phonons: The Theory of Transport Phenomena in Solids

LIKE a chemical compound, scientific knowledge is purified by recrystallization. When first published, each new grain of fact or theory shines from a mud of irrelevant or erroneous details. In subsequent discussion the grains are redissolved, and filtered. Finally, in books and treatises, the solution is allowed to precipitate into a single...

User Interface Design of Electronic Appliances
User Interface Design of Electronic Appliances
User Interface Design for Electronic Appliances fills an aching void in the literature of user experience. While pundits have been busy rhapsodizing about the coming convergence in interactive media, what has actually been happening is an explosive divergence in the form and functions of elec- tronic devices. Convergence, I...
Analysis of Algorithms : An Active Learning Approach
Analysis of Algorithms : An Active Learning Approach
The goal of Analysis of Algorithms is to raise awareness of the effect that algorithms have on the efficiency of a program and to develop the necessary skills to analyze general algorithms used in programs. The text presents the material with the expectation that it can be used with active and cooperative learning methodology, based on the premise...
Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition
Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition
"In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We...
Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design
Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design

Information Modeling and Relational Databases provides an introduction to ORM (Object Role Modeling)-and much more. In fact, it's the only book to go beyond introductory coverage and provide all of the in-depth instruction you need to transform knowledge from domain experts into a sound database design.

Inside, ORM...

Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)
Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)

This comprehensive guide to the strategic management of information systems within business and public sector organizations integrates the two, often disparate, domains of strategic management and information systems.  Focusing on managing information systems within a broader organizational context, it covers key issues...

Result Page: Previous 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy