熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
上市日期(可複選) | |
其他(可複選) |
搜尋結果共 63 筆, 頁數 1 / 2
呈現:
Control System - A Laboratory Approach
This book "CONTROL SYSTEM - A LABORATORY APPROACH" is used to the engineering students for laborator... more |
|||
Weed management in summer sesame
Sesame (Sesamum indicum L.) is one of the most important oilseed crops next to groundnut, rapeseed a... more |
|||
Secure Data Science: Integrating Cyber Security and Data Science
Secure data science, which integrates cyber security and data science, is becoming one of the critic... more |
|||
Data Mining: Technologies, Techniques, Tools, and Trends
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its u... more |
|||
Design and Implementation of Data Mining Tools
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explai... more |
|||
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. ... more |
|||
XML Databases and the Semantic Web
Efficient access to data, sharing data, extracting information from data, and making use of the info... more |
|||
Developing and Securing the Cloud
|
|||
Vegetable Peel Wastes - A Novel Medium for Cultivation of Fungi
|
|||
Big Data Analytics with Applications in Insider Threat Detection
Today s malware mutates randomly to avoid detection, but reactively adaptive malware is more intelli... more |
|||
Cultures in Motion
In the wide-ranging and innovative essays of Cultures in Motion, a dozen distinguished historians of... more |
|||
Analyzing and Securing Social Networks
Analyzing and Securing Social Networks focuses on the two major technologies that have been develope... more |
|||
Security and Privacy in Communication Networks: 11th International Conference, Securecomm 2015, Dallas, Tx, USA, October 26-29,
This volume constitutes the thoroughly refereed post-conference proceedings of the 11th Internationa... more |
|||
Impact Of Opinion Leaders On Consumer Decision Making Process
|
|||
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on t... more |
|||
The Yogi’s Roadmap: Patanjali Yoga Sutra As a Journey to Self Realization
The Yogi s Roadmap, Bhavani Maki offers unique, contemporary insights into the Yoga Sutra, revealing that deep, personal...... more |
|||
Enhancement of latent fingerprints on several paper materials
|
|||
Agaricus species in Kerala, India
|
|||
Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most book... more |
|||
Obstetric Anesthesia Handbook
The field of obstetric anesthesia continues to change rapidly, both in technique and in specific pha... more |
|||
Intelligence And Security Informatics: IEEE International Conference on Intelligence and Security Informatics, Isi 2006, San Die
In the past few years, intelligence and security informatics (ISI) research, which is concerned with... more |
|||
Security Management: Integrity, And Internal Control in Information Systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Confere
This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope ... more |
|||
Web And Information Security
Web and Information Security consists of a collection of papers written by leading experts in the fi... more |
|||
Data Mining: Technologies, Techniques, Tools, and Trends
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its u... more |
|||
Signal Processing for Joint Radar Communications
Signal Processing for Joint Radar Communications A one-stop, comprehensive source for the latest res... more |
|||
Next-Generation Cognitive Radar Systems
This book brings together contributions from leading researchers who are engaged in the research and... more |
|||
Green synthesis: silver nanoparticles against cancer
Green synthesis of silver nanoparticles from natural plant extracts is an environmentally friendly a... more |
|||
Spinel nano catalysts: structure, optics, magnetism
Spinel nano catalysts are a type of nanomaterials that have gained significant attention in recent y... more |
|||
Food Security and the Role of Legislation
Food security refers to the availability, access, and utilization of food that is safe, nutritious, ... more |
|||
Analyzing and Securing Social Networks
|
|||
Big Data Analytics with Applications in Insider Threat Detection
|
|||
Agriculture and Rural India After Economic Reforms: Essays for Venkatesh B. Athreya
The doctoral students of the economist and teacher Venkatesh B. Athreya organized a seminar in his h... more |
|||
Introduction to Finite Element Analysis and Design
Introduces the basic concepts of FEM in an easy-to-use format so that students and professionals can... more |
|||
Anon.
Welcome to Calcutta of the sixties and the seventies. Meet Debottam, the genius vagabond son of a we... more |
|||
Iterations of Law: Legal Histories from India
This volume reflects a recent transformation of the concerns of social scientists regarding the lega... more |
|||
Principles of Anaesthesia Equipment
Principles of Anaesthesia Equipment provides guidance on the safe use of a wide range of anaesthesia... more |
|||
Pbg Based Terahertz Antenna for Aerospace Applications
This book focuses on high-gain antennas in the terahertz spectrum and their optimization. The terahe... more |
|||
Analgesia and Anesthesia in Labour and Delivery-II
|
|||
Secure Data Provenance and Inference Control with Semantic Web
With an ever-increasing amount of information on the web, it is critical to understand the pedigree,... more |
|||
Analgesia and Anesthesia in Labor and Delivery-I
|
|||
Cultures in Motion
In the wide-ranging and innovative essays of Cultures in Motion, a dozen distinguished historians of... more |
|||
Diabetes in Children and Adolescents
Provides up to date knowledge on diabetes in children and adolescents, with particular emphasis on T... more |
|||
Damage in Composites
|
|||
Failure in Composites
|
|||
Document Raj: Writing and Scribes in Early Colonial South India
cultural categories in the making of Empire, but Bhavani Raman, in Document Raj, uncovers a lesser-known story of power: the...... more |
|||
Understanding Reforms: Post-1991 India
This book reviews the background, context, and timing of the economic reforms since July 1991 to sho... more |
|||
Financial Access in Post-Reform India
This book focuses on two important aspects of the financial sector: development and access. Combinin... more |
|||
Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain an... more |
|||
Design and Implementation of Data Mining Tools
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explai... more |
|||
Introduction to Finite Element Analysis and Design
|
|||
Understanding Reforms: Post 1991 India
|
|||
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. ... more |
|||
Web And Information Security
|
|||
Database And Applications Security: Integrating Information Security And Data Management
This is the first book to provide an in-depth coverage of all the developments, issues and challenge... more |
|||
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
The explosion of Web-based data has created a demand among executives and technologists for methods ... more |
|||
Knowledge Management: Classic and Contemporary Works
This book provides an introduction to the field of knowledge management. Taking a learning-centric r... more |
|||
Xml Databases and the Semantic Web
Efficient access to data, sharing data, extracting information from data, and making use of the info... more |
|||
Rethinking Interventions in Racism
|
|||
Managing and Mining Multimedia Databases
There is now so much data on the Web that managing it with conventional tools is becoming almost imp... more |
|||
Web Data Management and Electronic Commerce
Effective electronic commerce requires integrating resources and extracting the critical information... more |