Principles of Protein X-ray Crystallography provides the theoretical background necessary to understand how the structure ...
اقرأ المزيدThis book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
اقرأ المزيدThis volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
اقرأ المزيدThis new textbook is for contemporary signal detection and parameter estimation courses offered at the advanced undergraduate ...
اقرأ المزيدPresents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
اقرأ المزيدPrinciples of Translational Science in Medicine: From Bench to Bedside, Third Edition, provides an update on major achievements ...
اقرأ المزيدIntroduces the fundamentals and process of applied engineering design, including the necessary field investigations to characterize ...
اقرأ المزيدPrinciples of Spin is an introductory book for students and practicing software engineers who wish to learn Promela and Spin. ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيدConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيدPrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
اقرأ المزيدConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
اقرأ المزيدPrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
اقرأ المزيدVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
اقرأ المزيدPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيدExamining the efficiency of exits, this book offers recommendations and guidelines for an integrated and exit-oriented private ...
اقرأ المزيدA comprehensive guide to privileged structures and their application in the discovery of new drugs The use of privileged ...
اقرأ المزيدThis book begins by discussing the most fundamental of the three techniques: .NET Remoting in Visual Basic .NET, which allows ...
اقرأ المزيدWhile other extreme programming (XP) books are usually theoretical in approach, this book steers you through the practical ...
اقرأ المزيدWhether you are using Windows Forms to build rich-client business applications, or the ASP.NET 2.0 framework to build powerful ...
اقرأ المزيد