Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Computational Genomics: A Case Studies Approach
Introduction to Computational Genomics: A Case Studies Approach
Where did SARS come from? Have we inherited genes from Neanderthals? How do plants use their internal clock? The genomic revolution in biology enables us to answer such questions. But the revolution would have been impossible without the support of powerful computational and statistical methods that enable us to exploit genomic data. Many...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Ship-shaped Offshore Installations: Design, Building, and Operation
Ship-shaped Offshore Installations: Design, Building, and Operation
Ship-shaped offshore units are some of the more economical systems for the development of offshore oil and gas, and are often preferred in marginal fields. These systems are especially attractive to develop oil and gas fields in deep and ultra-deep water areas and remote locations away from existing pipeline infrastructures. Recently, the...
Bridging the Generation Gap
Bridging the Generation Gap

Miscommunication… Employee conflict… Work ethic debates… Loyalty issues… Varying wants and needs… If you are a manager, human resources professional, or business owner, you are faced with these types of issues every day. But why? Because currently, there are five generations in the workplace: Radio Babies...

How to Write a Lot: A Practical Guide to Productive Academic Writing
How to Write a Lot: A Practical Guide to Productive Academic Writing

All students and professors need to write, and many struggle to finish their stalled dissertations, journal articles, book chapters, or grant proposals. Writing is hard work and can be difficult to wedge into a frenetic academic schedule. In this practical, light-hearted, and encouraging book, Paul Silvia explains that writing productively...

E.Guide: San Francisco (Dk E > > Guides)
E.Guide: San Francisco (Dk E > > Guides)

Click onto www.esanfrancisco.dk.com for the latest news from and about places listed in the guide, plus readers’  reviews and chat, features on hot topics, and an up-to-the-minute short list of  San Francisco’s most useful service providers. The website is regularly updated, so every time you visit you bring your...

The Rough Guide to Thailand's Beaches  &  Islands 3 (Rough Guide Travel Guides)
The Rough Guide to Thailand's Beaches & Islands 3 (Rough Guide Travel Guides)

The Rough Guide to Thailand''s Beaches and Islands is the ultimate guideto these glorious destinations. From the enchanting and little-knownislands of Ban Krud and Suan Luang to the hip beach resort of PakNam Pran. A full-colour 24-page section introduces the highlights, withstunning photography of the best the islands have to offer....

Rails Cookbook
Rails Cookbook
Rails Cookbook is packed with the solutions you need to be a proficient developer with Rails, the leading framework for building the new generation of Web 2.0 applications. Recipes range from the basics, like installing Rails and setting up your development environment, to the latest techniques, such as developing RESTful web services....
IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh/Relaying, Performance and Spectrum Coexistence
IEEE 802 Wireless Systems: Protocols, Multi-Hop Mesh/Relaying, Performance and Spectrum Coexistence
Throughout the next decade, 802 wireless systems will become an integral part of fourth generation (4G) cellular communication systems, where the convergence of wireless and cellular networks will materialize through support of interworking and seamless roaming across dissimilar wireless and cellular radio access technologies. IEEE 802 Wireless...
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

Mobile Radio Network Design in the VHF and UHF Bands: A Practical Approach
Mobile Radio Network Design in the VHF and UHF Bands: A Practical Approach
An essential element of radio technology and propagation is how to use radio technology and knowledge of radio propagation to design a network that meets the needs of customers. Mobile Radio Network Design in the VHF and UHF Bands provides the technical and fundamental knowledge required for advanced mobile radio network design to...
Knowledge Management And Risk Strategies
Knowledge Management And Risk Strategies

This book deals with knowledge management with an emphasis on knowledge risk, i.e., a general trend of knowledge value getting shorter and becoming temporary. The shortening of knowledge value lifespan will have a profound impact on companies' employment policies, and employees' strategies for gaining knowledge. How to manage...

Result Page: Previous 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy