Basic Real Analysis and Advanced Real Analysis (available separately or together as a Set) systematically develop those concepts ...
Lire la suiteMasonry construction is usually the top priority in the constructive exercises during the course. The basic principles of ...
Lire la suiteThe contents of this book builds further on the contents of the first volume in the Philips Research Book Series, Battery ...
Lire la suiteThis treatise covers all aspects of the design and the daily operations of a beam diagnostic system for a large particle ...
Lire la suiteFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
Lire la suitePresents recent advances in modelling, planning and evaluating city logistics for sustainable and liveable cities based on ...
Lire la suitePresents recent advances in modelling, planning and evaluating city logistics for sustainable and liveable cities based on ...
Lire la suitePresents recent advances in modelling, planning and evaluating city logistics for sustainable and liveable cities based on ...
Lire la suiteProvides step-by-step protocols to help dental professionals accurately match, communicate, and reproduce the color of teeth ...
Lire la suiteCommunications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...
Lire la suiteThis book covered methodology and seven additional tracks on ad-hoc, natural language processing, heterogeneous collection, ...
Lire la suiteThis book covered methodology and seven additional tracks on ad-hoc, natural language processing, heterogeneous collection, ...
Lire la suiteProvides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Lire la suiteCovering developments in Conjoint Analysis, this book presents the theory and applications of this technique. It discusses: ...
Lire la suiteThis book presents contemporary empirical methods in software engineering related to the plurality of research methodologies, ...
Lire la suiteTime delays exist in many engineering systems such as transportation, communication, process engineering and networked control ...
Lire la suiteIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Lire la suiteFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
Lire la suiteImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
Lire la suiteExplains the fundamentals, advanced technologies, and best practices used in planning, designing, building and operating ...
Lire la suite