Principles of Protein X-ray Crystallography provides the theoretical background necessary to understand how the structure ...
Lire la suiteThis book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Lire la suiteThis volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Lire la suiteThis new textbook is for contemporary signal detection and parameter estimation courses offered at the advanced undergraduate ...
Lire la suitePresents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
Lire la suitePrinciples of Translational Science in Medicine: From Bench to Bedside, Third Edition, provides an update on major achievements ...
Lire la suiteIntroduces the fundamentals and process of applied engineering design, including the necessary field investigations to characterize ...
Lire la suitePrinciples of Spin is an introductory book for students and practicing software engineers who wish to learn Promela and Spin. ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Lire la suiteConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lire la suitePrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
Lire la suiteConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Lire la suitePrivacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
Lire la suiteVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Lire la suitePrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Lire la suiteExamining the efficiency of exits, this book offers recommendations and guidelines for an integrated and exit-oriented private ...
Lire la suiteA comprehensive guide to privileged structures and their application in the discovery of new drugs The use of privileged ...
Lire la suiteThis book begins by discussing the most fundamental of the three techniques: .NET Remoting in Visual Basic .NET, which allows ...
Lire la suiteWhile other extreme programming (XP) books are usually theoretical in approach, this book steers you through the practical ...
Lire la suiteWhether you are using Windows Forms to build rich-client business applications, or the ASP.NET 2.0 framework to build powerful ...
Lire la suite