Home | Amazing | Today | Tags | Publishers | Years | Search 
Insall & Scott Surgery of the Knee: Expert Consult - Online and Print, 5e
Insall & Scott Surgery of the Knee: Expert Consult - Online and Print, 5e

Online and in print, Insall & Scott Surgery of the Knee, edited by W. Norman Scott, MD, and 11 section editors who are experts in their fields, is your complete, multimedia guide to the most effective approaches for diagnosis and management of the full range of knee disorders affecting patients of all ages. From anatomical and...

Advances in Databases and Information Systems: 15th International Conference, ADBIS 2011, Vienna
Advances in Databases and Information Systems: 15th International Conference, ADBIS 2011, Vienna

The main objective of the ADBIS series of conferences is to provide a highly visible forum for the dissemination of research accomplishments and to promote interactions and collaborations among the database and information systems research communities from Central and Eastern European countries and with the rest of the world. The ADBIS...

Microsoft Dynamics CRM 2011 New Features
Microsoft Dynamics CRM 2011 New Features
Microsoft Dynamics CRM 2011 offers exciting new features that enable you to build and maintain a robust customer relationship management system for your organization.

This book is your one-stop resource for getting grips with most of the new features of Dynamics CRM 2011. To make learning fun and engaging, we will
...
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Machine Learning for Email: Spam Filtering and Priority Inbox
Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract
...
My iPad 2 (covers iOS 5) (3rd Edition)
My iPad 2 (covers iOS 5) (3rd Edition)

The iPad is a unique and totally revolutionary device in many ways. The iPad is a tablet computer featuring multi-touch interaction with print, video, photo, and audio multimedia, internet browsing, and runs most iPhone OS apps. The device has an LED-backlit 9.7-inch (25 cm) color LCD display and uses a virtual keyboard...

Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan
The 2011 International Conference on Web Information Systems and Mining (WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM 2011 received 472 submissions from 20 countries and regions. After rigorous reviews, 112 high-quality papers were selected for publication in the WISM 2011 proceedings. The...
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
User Modeling, Adaptation and Personalization: 19th International Conference, UMAP 2011, Girona, Spain
The 19th International Conference on User Modeling, Adaptation and Personalization (UMAP 2011) took place in Girona, Spain, during July 11–15, 2011. It was the third annual conference under the UMAP title, which resulted from the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive Hypermedia (AH)...
Microcontroller Programming: An Introduction
Microcontroller Programming: An Introduction

Microcontroller Programming: An Introduction is a comprehensive one-stop resource that covers the concepts, principles, solution development, and associated techniques involved in microcontroller-based systems. Focusing on the elements and features of the popular and powerful Motorola 68HC11 microcontroller IC as a...

Euclidean Shortest Paths: Exact or Approximate Algorithms
Euclidean Shortest Paths: Exact or Approximate Algorithms

This unique text/reference reviews algorithms for the exact or approximate solution of shortest-path problems, with a specific focus on a class of algorithms called rubberband algorithms. Discussing each concept and algorithm in depth, the book includes mathematical proofs for many of the given statements. Topics and features: provides...

Result Page: Previous 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy