Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Management Handbook, Sixth Edition, Volume 2
Information Security Management Handbook, Sixth Edition, Volume 2
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of...
Machine Learning: An Algorithmic Perspective (Chapman & Hall/Crc Machine Learning & Pattern Recognition)
Machine Learning: An Algorithmic Perspective (Chapman & Hall/Crc Machine Learning & Pattern Recognition)

Traditional books on machine learning can be divided into two groups ― those aimed at advanced undergraduates or early postgraduates with reasonable mathematical knowledge and those that are primers on how to code algorithms. The field is ready for a text that not only demonstrates how to use the algorithms that make up machine learning...

Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
Mayo Clinic Internal Medicine Concise Textbook
Mayo Clinic Internal Medicine Concise Textbook

Now for the first time, a new diagnosis and treatment guide with even more focus on the most commonly encountered disorders than ever before. All major internal medicine diseases and disorders are covered in this new succinct evidence-based guide to treatment and diagnosis in internal medicine.  Organized by body system, and focused on...

Network Design for IP Convergence
Network Design for IP Convergence
A Comprehensive “Global” Vision of Convergence

The emergence of quality-of-service (QoS) mechanisms continues to propel the development of real-time multimedia services such as VoIP and videoconferencing. However, there remain many challenges to achieving optimized standardization convergence.

...
Advances in Chromatographic Techniques for Therapeutic Drug Monitoring
Advances in Chromatographic Techniques for Therapeutic Drug Monitoring

For drugs with a narrow therapeutic index, therapeutic drug monitoring methods are essential for patient management. Although immunoassays are commercially available for many drugs and most laboratories use these assays for routine therapeutic monitoring, they have many limitations which hinder their efficacy. Providing practical guidelines for...

Content Preparation Guidelines for the Web and Information Appliances: Cross-Cultural Comparisons (Human Factors and Ergonomics)
Content Preparation Guidelines for the Web and Information Appliances: Cross-Cultural Comparisons (Human Factors and Ergonomics)

Content preparation is an integral part of the usability equation: it answers the question of what information is needed for effective decision making. Once content preparation has been established, the question "how to present what" can be answered. Content Preparation Guidelines for the Web and Information Appliances:...

Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)

The demands of increasingly complex embedded systems and associated performance computations have resulted in the development of heterogeneous computing architectures that often integrate several types of processors, analog and digital electronic components, and mechanical and optical components—all on a single chip. As a result, now the...

CAD and GIS Integration
CAD and GIS Integration

When used together effectively, computer-aided design (CAD) and geospatial information systems (GIS) have a solid track record for streamlining decision making and reducing inefficiencies in the design, planning, and execution of critical operations and projects. And a growing number of engineering tasks in numerous fields—including...

Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on...
Applied Software Product Line Engineering
Applied Software Product Line Engineering

Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries. Detailing the various aspects of SPLE implementation in different domains, Applied Software Product Line Engineering documents best...

Human Reliability Assessment Theory and Practice
Human Reliability Assessment Theory and Practice

A continually evolving discipline, Human Reliability Assessment (HRA) has elements of controversy from the definition of terms to the application of appropriate methods for the representation of human failure probability. The idea that human error is a random event is falling out of favor and the concept that humans can be set up to fail or...

Result Page: Previous 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy