Let Us Practice Data Security Essential Against APTs With Code

Security Solutions & Practical

Narasimham Challa, Sampath Dakshina Murthy Achanta - ISBN: 978-620-2-52896-2

ARBITRARY RATIO IMAGE RESIZING USING DCT

up sizing and downsizing of image by arbitrary ratio using DCT

Maithili Andhare, Santosh Randive, Kiran Napte - ISBN: 978-620-2-52784-2

Economics of Cloud Computing

Helping organizations make a decision about whether to adopt cloud computing in one or more of its forms

Praveen Ayyappa - ISBN: 978-620-2-52885-6

Comprehensive Project Risk Management

The Probabilistic Critical Path Method (PCPM)

Luis F. Copertari - ISBN: 978-620-2-52713-2

Cancer Immunotherapy

An experimental approach to immunotherapy of cancer using liposomes entrapped tumor associated antigens in mice model

Imliwati Longkumer - ISBN: 978-620-2-52453-7

Post Harvest Technologies in Fruits and Vegetables

The Protective Foods for Productive World

Bhavana A., Akshay R Patil, Deepak . - ISBN: 978-620-2-52755-2

Graphite based Magnetorheological Elastomer

Rheology and Resistivity

Muhammad Kashfi Shabdin, Mohd Azizi Abdul Rahman, Saiful Amri Mazlan - ISBN: 978-620-2-52731-6

Library and its User

Especially Women User

Isabella Mary - ISBN: 978-620-2-52837-5

Retention In Maxillofacial Prosthesis

Vilas Patel, J R Patel, Satish Makwana - ISBN: 978-620-2-52829-0

Modular Independent Component Analysis Approach for Face Recognition

Kailash Karande, Sanjay Talbar - ISBN: 978-620-2-52824-5