Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft  Excel  VBA Programming for the Absolute Beginner
Microsoft Excel VBA Programming for the Absolute Beginner
If you are new to programming with Microsoft Excel VBA and are looking for a solid introduction, this is the book for you. Developed by computer science professors, books in the "for the absolute beginner" series teach the principles of programming through simple game creation. Microsoft Excel VBA Programming for the Absolute Beginner,...
Endocrine-Disrupting Chemicals: From Basic Research to Clinical Practice (Contemporary Endocrinology)
Endocrine-Disrupting Chemicals: From Basic Research to Clinical Practice (Contemporary Endocrinology)

This book provides comprehensive coverage of the three most important themes in the field of Endocrine Disrupting Chemicals (EDC) research: the basic biology of EDCs, particularly their effects on reproductive systems; EDC effects on humans and wildlife, including biomedical considerations; and potential interventions and practical advice for...

A Beginner's Guide to Graph Theory
A Beginner's Guide to Graph Theory

Concisely written, gentle introduction to graph theory suitable as a textbook or for self-study

Graph-theoretic applications from diverse fields (computer science, engineering, chemistry, management science)

2nd ed. includes new chapters on labeling and communications networks and small worlds, as well as expanded...

Immunological Tolerance: Methods and Protocols (Methods in Molecular Biology)
Immunological Tolerance: Methods and Protocols (Methods in Molecular Biology)

Immunological Tolerance: Methods and Protocols is a comprehensive guide to the techniques currently used for culturing and characterising the cell types responsible for imposing self-tolerance and the experimental models employed to study their function both in vitro and in vivo. This guide is aimed at AIDS researchers, immunologists,...

Urinary Stone Disease: The Practical Guide to Medical and Surgical Management (Current Clinical Urology)
Urinary Stone Disease: The Practical Guide to Medical and Surgical Management (Current Clinical Urology)

This practical guide is a compendium of contemporary views on the development, treatment, and prevention of urinary stone disease. Emphasis is placed on utilizing current research to highlight areas of potential discovery and inspire novel approaches to easing the burden of urinary stone disease.

...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
Smartphone Operating System Concepts with Symbian OS: A Tutorial Guide (Symbian Press)
Smartphone Operating System Concepts with Symbian OS: A Tutorial Guide (Symbian Press)
Smartphone Operating System Concepts with Symbian OS uses Symbian OS as a vehicle to discuss operating system concepts as they are applied to mobile operating systems.It is this focus that makes this tutorial guide both invaluable and extremely relevant for today's student.In addition to presenting and discussing operating system concepts, this...
Pattern Oriented Software Architecture Volume 5: On Patterns and Pattern Languages
Pattern Oriented Software Architecture Volume 5: On Patterns and Pattern Languages
This book provides an in-depth exploration of the pattern concept. Starting with a popular—yet brief and incomplete—pattern definition, we first motivate, examine, and develop the inherent properties of stand-alone patterns. A solid understanding of what a stand-alone pattern is—and what it is not—helps when applying...
Ambient Networks: Co-operative Mobile Networking for the Wireless World
Ambient Networks: Co-operative Mobile Networking for the Wireless World

Ambient Networks defines a new kind of network architecture, which embeds support for co operation and competition between diverse network types within a common control layer. This unified networking concept can adapt to the heterogeneous environments of different radio technologies and service and network environments.  Special...

Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect...
Finite Model Theory and Its Applications (Texts in Theoretical Computer Science. An EATCS Series)
Finite Model Theory and Its Applications (Texts in Theoretical Computer Science. An EATCS Series)
This book gives a comprehensive overview of central themes of finite model theory expressive power, descriptive complexity, and zero-one laws together with selected applications relating to database theory and artificial intelligence, especially constraint databases and constraint satisfaction problems. The final chapter provides a concise modern...
Semantic Web Services: Concepts, Technologies, and Applications
Semantic Web Services: Concepts, Technologies, and Applications
In just a few years, service-oriented architectures (SOA) and Web services not only gained considerable interest in computer science research, they were also taken up with unanimity by all major international players in the IT industry. However, and in spite of all existing standards, in most SOA applications much human intervention is still...
Result Page: Previous 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy