Home | Amazing | Today | Tags | Publishers | Years | Search 
History and Health Policy in the United States: Putting the Past Back In (Critical Issues in Health and Medicine)
History and Health Policy in the United States: Putting the Past Back In (Critical Issues in Health and Medicine)
In our rapidly advancing scientific and technological world, many take great pride and comfort in believing that we are on the threshold of new ways of thinking, living, and understanding ourselves. But despite dramatic discoveries that appear in every way to herald the future, legacies still carry great weight. Even in swiftly developing...
Firewall Fundamentals
Firewall Fundamentals

The essential guide to understanding and using firewalls to protect personal computers and your network

  • An easy-to-read introduction to the most commonly deployed network security device

  • Understand the threats firewalls are designed to...

QoS for IP/MPLS Networks
QoS for IP/MPLS Networks

The comprehensive guide to implementing QoS in multiservice networks using IP/MPLS

  • Understand the technology components of implementing QoS in a multiservice network

  • Learn how to configure the MPLS QoS functionality in Cisco...

.NET 2.0 for Delphi Programmers
.NET 2.0 for Delphi Programmers

.NET 2.0 for Delphi Programmers explores .NET from a Delphi programmer's viewpoint, and it is ideal for Delphi programmers moving to .NET. It presents the core concepts of the .NET world in terms you are familiar with. This book will help you with Delphi for .NET as well as C#.

Apress publishes migration books for both VB 6 and...

Essential Software Architecture
Essential Software Architecture

Job titles like "Technical Architect" and "Chief Architect" nowadays abound in the software industry, yet many people suspect that "architecture" is one of the most overused and least understood terms in professional software development.

Gorton's book helps resolve this predicament. It concisely describes...

CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

Computation Engineering: Applied Automata Theory and Logic
Computation Engineering: Applied Automata Theory and Logic

The computer hardware and software industry is committed to using formal methods. As a result, it is crucial that students who take automata theory and logic courses retain what they have learned and understand how to use their knowledge. Yet many textbooks typically emphasize automata theory only, not logic, thus losing a valuable opportunity...

Innovations in Robot Mobility and Control (Studies in Computational Intelligence)
Innovations in Robot Mobility and Control (Studies in Computational Intelligence)

There exists quite a vast literature on mobile robots, covering fundamental principles on motion control and path-planning in indoor environments using ultrasonic/laser transducers. However, there is a scarcity of books/collective documents on vision based navigation of mobile robots and multi-agent systems. The book fills this gap and attempts...

Neural Networks in a Softcomputing Framework
Neural Networks in a Softcomputing Framework
Conventional model-based data processing methods are computationally expensive and require experts’ knowledge for the modelling of a system; neural networks provide a model-free, adaptive, parallel-processing solution. Neural Networks in a Softcomputing Framework presents a thorough review of the most popular neural-network methods and their...
Intelligent Paradigms for Assistive and Preventive Healthcare (Studies in Computational Intelligence)
Intelligent Paradigms for Assistive and Preventive Healthcare (Studies in Computational Intelligence)
This book presents some of the recent advances in assistive and preventive healthcare in intelligent environment. As the world is becoming increasingly aware of the needs of people with disabilities, researchers are finding new technologies and applications to assist disabled people in performing the everyday activities which able-bodied people...
Advances in Computational Intelligence: Theory And Applications
Advances in Computational Intelligence: Theory And Applications
Computational Intelligence (CI) is a recently emerging area in fundamental and applied research, exploiting a number of advanced information processing technologies that mainly embody neural networks, fuzzy logic and evolutionary computation. With a major concern to exploiting the tolerance for imperfection, uncertainty, and partial truth to...
Micromechanical Photonics (Microtechnology and MEMS)
Micromechanical Photonics (Microtechnology and MEMS)
The recent remarkable development of microsystems dates back to 1983 when Richard P. Feynman of California University delivered a speech to a large audience of scientists and engineers at the Jet Propulsion Laboratory. He presented the concept of sacrificed etchingto fabricate a silicon micromotor, and pointed out the need for...
Result Page: Previous 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy