 |
|
|
|
|
 Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on
is often beyond what they have been prepared for. The nature of securing an enterprise
is daunting and overwhelming. There are no simple checklists or roadmaps for success.
Many of the technical security skills a CISO has acquired during the early... |  |  MongoDB Applied Design Patterns
Whether you’re building a social media site or an internal-use enterprise application, this hands-on guide shows you the connection between MongoDb and the business problems it’s designed to solve. You’ll learn how to apply MongoDb design patterns to several challenging domains, such as ecommerce, content... |  |  Digital Signal Processing for Medical Imaging Using Matlab
This book describes medical imaging systems, such as X-ray, Computed tomography, MRI, etc. from the point of view of digital signal processing. Readers will see techniques applied to medical imaging such as Radon transformation, image reconstruction, image rendering, image enhancement and restoration, and more.
This book also... |
|
Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 |