Bioelectricity: A Quantitative Approach
The study of electrophysiology has progressed rapidly because of the precise, delicate, and ingenious
experimental studies of many investigators. The field has also made great strides by unifying
these experimental observations through mathematical descriptions based on electromagnetic
field theory, electrochemistry, etc., which... Safety of Electromedical Devices: Law - Risks - Opportunities
The book discusses the legal and technical requirements for manufacturers, designers and testers of electromedical devices. It describes which obstacles must be overcome to introduce a medical device on the European market, but also informs readers as to pitfalls and opportunities, and in which way safety can be achieved and product liability...
Principles and Models of Biological Transport Transport processes are ubiquitous in the living organism, underlying nerve conduction and muscle contraction, digestion, kidney function and the nourishment of every cell in the body. The mechanisms by which these processes take place, and the models that describe them, are the subject of Principles and Models of Biological Transport,...
Carrier Ethernet: Providing the Need for Speed Facilitating high data transfers over long distances at a reasonable cost, Carrier Ethernet is solidifying its fundamental position as the core of next-generation networks. Since it first dazzled the IT world 40 years ago with its ability to move data over local networks, Ethernet has dramatically evolved in both form and function. And now, Carrier... Mastering Maya 2009
The Ultimate Maya 2009 Resource for Intermediate to Advanced Users
If you already know the basics of Maya, now you can elevate your skills with Maya 2009 and the advanced coverage in this authoritative new reference and tutorial. From modeling, texturing, animation, and visual effects to high-level techniques for film, television, games,...
Google Hacking for Penetration Testers Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
|Result Page: 9 8 7 6 5 4 3 2 1 |