Online and in print, Insall & Scott Surgery of the Knee, edited by W. Norman Scott, MD, and 11 section editors who are experts in their fields, is your complete, multimedia guide to the most effective approaches for diagnosis and management of the full range of knee disorders affecting patients of all ages. From anatomical and...
The main objective of the ADBIS series of conferences is to provide a highly visible forum for the dissemination of research accomplishments and to promote interactions and collaborations among the database and information systems research communities from Central and Eastern European countries and with the rest of the world. The ADBIS...
Microsoft Dynamics CRM 2011 offers exciting new features that enable you
to build and maintain a robust customer relationship management system for
your organization.
This book is your one-stop resource for getting grips with most of the new features of Dynamics CRM 2011. To make learning fun and engaging, we will...
Digital forensics deals with the acquisition, preservation, examination,
analysis and presentation of electronic evidence. Networked computing,
wireless communications and portable electronic devices have expanded
the role of digital forensics beyond traditional computer crime investigations.
Practically every type of crime now...
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract...
The iPad is a unique and totally revolutionary device in many ways. The iPad is a tablet computer featuring multi-touch interaction with print, video, photo, and audio multimedia, internet browsing, and runs most iPhone OS apps. The device has an LED-backlit 9.7-inch (25 cm) color LCD display and uses a virtual keyboard...
Security Smarts for the Self-Guided IT Professional
“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...
Computer Vision is the science and technology of machines that see. The dominant
scientific conferences in computer vision, such as ICCV, CVPR and ECCV,
concentrate on theories and models for obtaining information from images and
image sequences. The intensely competitive nature of these conferences leaves
little room to...
The 2011 International Conference on Web Information Systems and Mining
(WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM
2011 received 472 submissions from 20 countries and regions. After rigorous
reviews, 112 high-quality papers were selected for publication in the WISM 2011
proceedings. The...
The 19th International Conference on User Modeling, Adaptation and Personalization
(UMAP 2011) took place in Girona, Spain, during July 11–15, 2011.
It was the third annual conference under the UMAP title, which resulted from
the merger in 2009 of the successful biannual User Modeling (UM) and Adaptive
Hypermedia (AH)...
Microcontroller Programming: An Introduction is a comprehensive one-stop resource that covers the concepts, principles, solution development, and associated techniques involved in microcontroller-based systems. Focusing on the elements and features of the popular and powerful Motorola 68HC11 microcontroller IC as a...
This unique text/reference reviews algorithms for the exact or approximate solution of shortest-path problems, with a specific focus on a class of algorithms called rubberband algorithms. Discussing each concept and algorithm in depth, the book includes mathematical proofs for many of the given statements. Topics and features: provides...