Browse
Author profile
Load More
TRAINING MAJORS
- Khoa Điện - Tự động hóa (791)
- Khoa Công nghệ thông tin (480)
- Khoa Cơ khí (370)
- Khoa Dệt may và Thời Trang (158)
- Khoa Công nghệ thực phẩm (112)
Load More
Học liệu điện tử (Electronic learning materials)
Browsing Học liệu điện tử (Electronic learning materials) by Issue Date
Now showing 1 - 24 of 101
Results Per Page
Sort Options
- PublicationPressure Garments : A Manual on Their Design and Fabrication(Butterworth-Heinemann, 1995) Pratt, Joanne; West, GillPressure Garments: A Manual on their Design & Fabrication presents the development and principles of pressure therapy. It discusses the physical description and treatment of burns. It addresses the emotional and physical effect of scars caused by burn injury. Some of the topics covered in the book are the comparison of keloid and hypertrophic scars; management of hypertrophic scarring; methods of pressure application; complications of pressure therapy; pressure therapy treatment regimen; stages in garment design and production; glove measurements; and design considerations. The description of upper limb garments is fully covered. An in-depth account of the measurements, pattern drafting, fabric cutting, and sewing of the garment is provided. The book can provide useful information to therapists, students, and researchers.
- PublicationNetwork Simulation(Springer, 2007) Fujimoto, Richard M.; Perumalla, Kalyan S.; Riley, George F.A detailed introduction to the design, implementation, and use of network simulation tools is presented. The requirements and issues faced in the design of simulators for wired and wireless networks are discussed. Abstractions such as packet- and fluid-level network models are covered. Several existing simulations are given as examples, with details and rationales regarding design decisions presented. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the scale and performance of a simulation environment.
- PublicationSOA in Practice : The Art of Distributed System Design(O'Reilly Media, 2007) Josuttis, Nicolai M.This book demonstrates service-oriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling out a SOA at a major corporation, SOA in Practice explains how SOA can simplify the creation and maintenance of large-scale applications. Whether your project involves a large set of Web Services-based components, or connects legacy applications to modern business processes, this book clarifies how -- and whether -- SOA fits your needs.SOA has been a vision for years. This book brings it down to earth by describing the real-world problems of implementing and running a SOA in practice. After defining SOA's many facets, examining typical use patterns, and exploring how loose coupling helps build stronger applications, SOA in Practice presents a framework to help you determine when to take advantage of SOA.
- PublicationNatural Language Processing with Python : Analyzing Text with the Natural Language Toolkit(O'Reilly Media, 2009) Bird, Steven; Klein, Ewan; Loper, EdwardThis book offers a highly accessible introduction to natural language processing, the field that supports a variety of language technologies, from predictive text and email filtering to automatic summarization and translation. With it, you'll learn how to write Python programs that work with large collections of unstructured text. You'll access richly annotated datasets using a comprehensive range of linguistic data structures, and you'll understand the main algorithms for analyzing the content and structure of written communication.
- PublicationHandbook of Textile Fibre Structure : Volume 1: Fundamentals and Manufactured Polymer Fibres(Woodhead Publishing, 2009) Eichhorn, Stephen; Hearle, J. W. S.; Jaffe, M; Kikutani, TDue to their complexity and diversity, understanding the structure of textile fibres is of key importance. This authoritative two-volume collection provides a comprehensive review of the structure of an extensive range of textile fibres.Volume 1 begins with an introductory set of chapters on fibre structure and methods to characterise fibres. The second part of the book covers the structure of manufactured polymer fibres such as polyester, polyamides, polyolefin, elastomeric and aramid fibres as well as high-modulus, high-tenacity polymer fibres. Chapters discuss fibre formation during processing and how this affects fibre structure and mechanical properties. A companion volume reviews natural, regenerated, inorganic and specialist fibres.Edited by leading authorities on the subject and with a team of international authors, the two volumes of the Handbook of textile fibre structure is an essential reference for textile technologists, fibre scientists, textile engineers and those in academia. - The first title of a authoritative two-volume collection that provides a comprehensive review of the structure of a range of textile fibres - Provides an overview of the development of fibre structure and methods to characterise fibres - Examines the structure of both traditional and new fibres and natural and manufactured fibres
- PublicationHandbook of Textile Fibre Structure : Volume 2: Natural, Regenerated, Inorganic and Specialist Fibres(Woodhead Publishing, 2009) Eichhorn, Stephen; Hearle, J. W. S.; Jaffe, M; Kikutani, TDue to their complexity and diversity, understanding the structure of textile fibres is of key importance. This authoritative two-volume collection provides a comprehensive review of the structure of an extensive range of textile fibres.Volume 2 begins by reviewing natural fibres such as cellulosic, cotton, protein, wool and silk fibres. Part two considers regenerated cellulosic, protein, alginate, chitin and chitosan fibres. The final part of the book discusses inorganic fibres such as glass, carbon and ceramic fibres as well as specialist fibres such as thermally and chemically-resistant fibres, optical and hollow fibres. Chapters review how fibre structure contributes to key mechanical properties. A companion volume reviews the structure of manufactured polymer fibres.Edited by leading authorities on the subject and with a team of international authors, the two volumes of the Handbook of textile fibre structure is an essential reference for textile technologists, fibre scientists, textile engineers and those in academia. - Discusses how fibre structure contributes to key mechanical properties - Reviews natural fibres such as cellulosic, cotton and silk fibres and considers various regenerated fibres - Examines inorganic fibres including glass and carbon as well as specialist fibres such as chemically-resistant and optical fibres
- PublicationIntroduction to Food Toxicology(Academic Press, 2009) Shibamoto, Takayuki; Bjeldanes, Leonard F.The rapidly expanding field of food safety includes many new developments in the understanding of the entire range of toxic compounds found in foods -- whether naturally occurring or having been introduced by industry or food processing methods. This 2e of Introduction to Food Toxicology explores these developments while continuing to provide a core understanding of the basic principles of food toxicology. - Solid-phase extraction, immunoassay, and LC/MS - Mechanisms of regulation of xenobiotic activation and deactivation - Developments in the modes of action and impact of natural toxins in food plants - A comprehensive review of the issues surrounding dioxins - The function of antioxidants and their toxicological aspects - Acrylamide, its occurrence, toxicity and regulation on its use - Phytochemicals, their beneficial effects and the modes of action of this growing group of nutraceuticals from food plants - Diet and drug interactions
- PublicationData Warehousing For Dummies(Wiley Publishing, 2009) Hammergren, Thomas C.Data warehousing is one of the hottest business topics, and there's more to understanding data warehousing technologies than you might think. Find out the basics of data warehousing and how it facilitates data mining and business intelligence with Data Warehousing For Dummies, 2nd Edition. Data is probably your company's most important asset, so your data warehouse should serve your needs. The fully updated Second Edition of Data Warehousing For Dummies helps you understand, develop, implement, and use data warehouses, and offers a sneak peek into their future. You'll learn to: Analyze top-down and bottom-up data warehouse designs Understand the structure and technologies of data warehouses, operational data stores, and data marts Choose your project team and apply best development practices to your data warehousing projects Implement a data warehouse, step by step, and involve end-users in the process Review and upgrade existing data storage to make it serve your needs Comprehend OLAP, column-wise databases, hardware assisted databases, and middleware
- PublicationTechniques and Principles in Language Teaching 3rd Edition(Oxford University Press, 2011) Larsen-Freeman, Diane; Anderson, MartiTechniques and Principles in Language Teaching has influenced the way thousands of teachers have taught English. This classic guide to developing the way you teach has been an essential resource to new and experienced teachers worldwide, and is now in its third edition. Each chapter focuses on a different teaching approach, describing it being used in the classroom, analyzing what happened, and helping you think how you could apply it to your own teaching. New features of the third edition include: a new discussion on the political dimensions of language teaching, a new digital technology chapter, and extended coverage of content-based and task-based approaches. On this site you will find additional resources, including author videos in which Diane Larsen-Freeman and Marti Anderson talk about the background to the book and new innovations in language teaching which are discussed in the third edition.
- PublicationRecommender Systems Handbook(Springer, 2011) Ricci, Francesco; Rokach, Lior; Shapira, Bracha; Kantor, Paul B.The explosive growth of e-commerce and online environments has made the issue of information search and selection increasingly serious; users are overloaded by options to consider and they may not have the time or knowledge to personally evaluate these options. Recommender systems have proven to be a valuable way for online users to cope with the information overload and have become one of the most powerful and popular tools in electronic commerce. Correspondingly, various techniques for recommendation generation have been proposed. During the last decade, many of them have also been successfully deployed in commercial environments.
- PublicationDestination Marketing and Management : Theories and Applications(CAB International, 2011) Wang, Youcheng; Pizam, AbrahamMost tourism activities take place at a destination, and destination serves as a fundamental unit of analysis in any modelling of the tourism system. However, destination marketing and management is a complex subject that requires a comprehensive, holistic and systematic approach. From the demand side, travellers have a choice of available destinations; from the supply side, destination marketing organizations are competing for attention from a highly competitive marketplace. Taking an integrated and comprehensive approach, this book focuses on both the macro and micro aspects of destination marketing and management. Some key areas covered include the consumer decision making process, product development and distribution and the use of emerging technologies in destination marketing.
- PublicationMetric Pattern Cutting for Menswear(Wiley-Blackwell, 2011) Aldrich, WinifredSince the first edition was published in 1980, Metric Pattern Cutting for Menswear has become established as the standard work on this subject and has proved invaluable as both a textbook for students and a reference source for the practising designer. In this fifth edition, the chapter on computer aided design now has full colour illustrations and reflects the growing importance of CAD to the industry and as a part of fashion and design courses. The rest of the book has been updated where necessary: in particular, new blocks for tailored shirts, new details on how to adapt men's blocks for women's wear, and a revision of sizing and labelling information. Colour is now used to differentiate the main groups of patterns and with its tried and tested layout with clear text and diagrams, Metric Pattern Cutting for Menswear is an essential purchase for students of fashion and design.
- PublicationWireless Network Security A Beginner's Guide(McGraw Hill, 2012) Wrightson, TylerSecurity Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. Wireless Network Security: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience
- PublicationIntroduction to Network Simulator NS2(Springer, 2012) Issariyakul, Teerawat; Hossain, EkramIntroduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models.
- PublicationProgramming Computer Vision with Python : Tools and Algorithms for Analyzing Images(Reilly - O'Reilly Media, 2012) Solem, Jan ErikThis book is ideal for students, researchers, and enthusiasts with basic programming and standard mathematical skills.Learn techniques used in robot navigation, medical image analysis, and other computer vision applicationsWork with image mappings and transforms, such as texture warping and panorama creationCompute 3D reconstructions from several images of the same sceneOrganize images based on similarity or content, using clustering methodsBuild efficient image retrieval techniques to search for images based on visual contentUse algorithms to classify image content and recognize objectsAccess the popular OpenCV library through a Python interface.
- PublicationPractical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software(2012) Sikorski, Michael; Honig, AndrewMalware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:–Set up a safe virtual environment to analyze malware–Quickly extract network signatures and host-based indicators–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques–Use your newfound knowledge of Windows internals for malware analysis–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers–Analyze special cases of malware with shellcode, C++, and 64-bit code
- PublicationTextile Processes : Quality Control and Design of Experiments(Momentum Press, 2013) Damyanov, Georgi Borisov; Stoyanova ,Diana; Germanova-KrastevaTextiles are everywhere in the modern world as natural, synthetic, and blended fibers, yarns, and fabrics. They might be woven or non-woven. We use them for cloths of all varieties from disposal wipes to bandages to blankets to clothing. We use them in the upholsteries, carpets, and curtains in our homes and in cars and aircraft. Textiles are now “smart.” They can be embedded with sensors that monitor our life functions, such as heart rate and breathing, and send signals to medical authorities about pending heart attacks. Giving the textiles different forms through cutting and sewing as well as combining different textile and non-textile materials, we can produce products with a wide range of applications. All of them, nevertheless, are produced by similar manufacturing processes.
- PublicationJoining Textiles: Principles and Applications(Woodhead Publishing, 2013) Jones, I.; Stylios, G. K.Understanding the techniques for joining fabrics together in a way that considers durability, strength, leak-tightness, comfort in wear and the aesthetics of the joints is critical to the production of successful, structurally secure fabric products. Joining textiles: Principles and applications is an authoritative guide to the key theories and methods used to join fabrics efficiently.Part one provides a clear overview of sewing technology. The mechanics of stitching, sewing and problems related to sewn textiles are discussed, along with mechanisms of sewing machines and intelligent sewing systems. Part two goes on to explore adhesive bonding of textiles, including principles, methods and applications, along with a review of bonding requirements in coating and laminating of textiles.
- PublicationWireless Networking : Understanding Internetworking Challenges(Wiley-IEEE Press, 2013) Burbank, Jack L.; Andrusenko, Julia; Everett, Jared S.; Kasch, William T. M.This book focuses on providing a detailed and practical explanation of key existing and emerging wireless networking technologies and trends,while minimizing the amount of theoretical background information. The book also goes beyond simply presenting what the technology is, but also examines why the technology is the way it is, the history of its development, standardization, and deployment. The book also describes how each technology is used, what problems it was designed to solve, what problems it was not designed to solve., how it relates to other technologies in the marketplace, and internetworking challenges faced withing the context of the Internet, as well as providing deployment trends and standardization trends. Finally, this book decomposes evolving wireless technologies to identify key technical and usage trends in order to discuss the likely characteristics of future wireless networks.
- PublicationBig Data For Dummies(For Dummies, 2013) Hurwitz, Judith S.; Nugent, Alan; Halper, Fern; Kaufman, MarciaFind the right big data solution for your business or organization Big data management is one of the major challenges facing business, industry, and not-for-profit organizations. Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly outpace the capacity of traditional data management tools. If you need to develop or manage big data solutions, you'll appreciate how these four experts define, explain, and guide you through this new and often confusing concept. You'll learn what it is, why it matters, and how to choose and implement solutions that work. Effectively managing big data is an issue of growing importance to businesses, not-for-profit organizations, government, and IT professionals Authors are experts in information management, big data, and a variety of solutions Explains big data in detail and discusses how to select and implement a solution, security concerns to consider, data storage and presentation issues, analytics, and much more
- PublicationThe Cambridge Handbook of Second Language Acquisition(Cambridge University Press, 2013) Herschensohn, Julia; Young-Scholten, MarthaWhat is language and how can we investigate its acquisition by children or adults? What perspectives exist from which to view acquisition? What internal constraints and external factors shape acquisition? What are the properties of interlanguage systems? This comprehensive 31-chapter handbook is an authoritative survey of second language acquisition (SLA). Its multi-perspective synopsis on recent developments in SLA research provides significant contributions by established experts and widely recognized younger talent. It covers cutting-edge and emerging areas of enquiry not treated elsewhere in a single handbook, including third language acquisition, electronic communication, incomplete first language acquisition, alphabetic literacy and SLA, affect and the brain, discourse, and identity. Written to be accessible to newcomers as well as experienced scholars of SLA, the Handbook is organised into six thematic sections, each with an editor-written introduction.
- PublicationPenetration Testing : A Hands-On Introduction to Hacking(2014) Weidman, GeorgiaPenetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.Learn how to:–Crack passwords and wireless network keys with brute-forcing and wordlists–Test web applications for vulnerabilities–Use the Metasploit Framework to launch exploits and write your own Metasploit modules–Automate social-engineering attacks–Bypass antivirus software–Turn access to one machine into total control of the enterprise in the post exploitation phase
- PublicationWorld Clothing and Fashion : An Encyclopedia of History, Culture, and Social Influence(Sharpe Reference, 2014) Snodgrass, Mary EllenTaking a global, multicultural, social, and economic perspective, this work explores the diverse and colourful history of human attire. From prehistoric times to the age of globalization, articles cover the evolution of clothing utility, style, production, and commerce, including accessories (shoes, hats, gloves, handbags, and jewellery) for men, women, and children.Dress for different climates, occupations, recreational activities, religious observances, rites of passages, and other human needs and purposes - from hunting and warfare to sports and space exploration - are examined in depth and detail. Fashion and design trends in diverse historical periods, regions and countries, and social and ethnic groups constitute a major area of coverage, as does the evolution of materials (from animal fur to textiles to synthetic fabrics) and production methods (from sewing and weaving to industrial manufacturing and computer-aided design).
- PublicationUnderstanding Second Language Acquisition 2nd Edition(Oxford University Press, 2015) Ellis, RodIn the 30 years since Rod Ellis first published the award-winning Understanding Second Language Acquisition, it has become a classic text. This new, fully updated edition continues to provide an authoritative and highly readable introduction to key areas of theory and research in second language acquisition. Ellis presents a comprehensive overview of the different theories in this field and examines critical reactions to them. The book reflects recent trends in looking at cognitive and social aspects of second language acquisition, as well as examining the roles played by implicit and explicit instruction in language learning.
- 1 (current)
- 2
- 3
- 4
- 5