|
|
|
|
|
| | | | E-health Systems Diffusion And Use: The Innovation, the User And the Use It ModelE-Health Systems Diffusion and Use: The Innovation, the User and the Use IT Model offers an overview of the use and diffusion of information systems in the health care sector with particular attention to the role of the user. This book starts with classic contributions and modifications and then continues with contemporary contributions, which... |
|
Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... | | Cellular Authentication for Mobile and Internet ServicesAn invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and integration into existing networks
Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure... | | Pro Tools LE 7 Ignite! (Pro Tools Le 7 Ignite!: The Visual Guide for New Users)Get ready to explore the world of computer music creation with Pro Tools® LE 7! Even if you’ve never created music on your computer, Pro Tools LE 7 Ignite!, Second Edition will give you the skills you need to record and mix with confidence. Completely updated to cover the new features of Pro Tools LE 7.3 and 7.4, the book presents... |
|
A Splendid Exchange: How Trade Shaped the WorldA sweeping narrative history of world trade--from Mesopotamia in 3000 B.C. to the firestorm over globalization today--that brilliantly explores trade's colorful and contentious past and provides new insights into its future
Adam Smith wrote that man has an intrinsic "propensity to truck, barter, and exchange one thing for... | | Sabiston Textbook of Surgery: Expert Consult: Online and Print, 18e
This distinguished reference carries on a 70-year legacy as the world's most thorough, useful, readable, and understandable text on the principles and techniques of surgery. Its peerless contributors deliver all the well-rounded, state-of-the-art knowledge you need to richly grasp the pathophysiology and optimal management of every... | | Cisco Security ArchitecturesCisco Security Architectures demystifies access lists, the PIX Firewall, and how to secure a Cisco based network.
In today's age of remote users and widespread Internet access, security continues to be of utmost importance to network administrators and engineers. This important, comprehensive guide shows you how to avoid common mistakes... |
|
|
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 |