Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Wiley Handbook of Problem-Based Learning (Wiley Handbooks in Education)
The Wiley Handbook of Problem-Based Learning (Wiley Handbooks in Education)

The first book to offer an in-depth exploration of the topic of problem-based learning with contributions from international experts

The Wiley Handbook of Problem-Based Learning is the first book of its kind to present a collection of original essays that integrate the research and practice of...

Cato the Younger: Life and Death at the End of the Roman Republic
Cato the Younger: Life and Death at the End of the Roman Republic
Marcus Porcius Cato ("the Younger") is most famous for being Julius Caesar's nemesis. His sustained antagonism was in large part responsible for pushing the Romans towards civil war. Yet Cato never wanted war even though he used the threat of violence against Caesar. This strategic gamble misfired as Caesar, instead of...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures
Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures

Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery

The increased role of IT in the healthcare sector has led to the coining of a new phrase "health informatics," which deals with the use of IT for better healthcare services. Health informatics applications often...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Java Software Solutions (8th Edition)
Java Software Solutions (8th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab  search for ISBN-10: 0133796280/ISBN-13: 9780133796285. That package includes ISBN-10: 0133594955/ISBN-13: 9780133594959 and...

Starting Out with C++: From Control Structures through Objects (7th Edition)
Starting Out with C++: From Control Structures through Objects (7th Edition)
Welcome to Starting Out with C++: From Control Structures through Objects, 7th edition. This book is intended for use in a two-semester C++ programming sequence, or an accelerated one-semester course. Students new to programming, as well as those with prior course work in other languages, will nd this text bene cial. The...
Advanced Electrical Installation Work, Fourth Edition
Advanced Electrical Installation Work, Fourth Edition

Advanced Electrical Installation Work has helped thousands of students to achieve success in City & Guilds awards in electrical installation. Now in its fourth edition, this book has been completely restructured to provide a specific match to the requirements of the Installation route of the 2330 Level 3...

Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Real-Time Stability Assessment in Modern Power System Control Centers
Real-Time Stability Assessment in Modern Power System Control Centers
This book answers the need for a practical, hands-on guide for assessing power stability in real time, rather than in offline simulations. Since the book is primarily geared toward the practical aspects of the subject, theoretical background is reduced to the strictest minimum. For the benefit of readers who may not be quite familiar with the...
Children's Respiratory Nursing
Children's Respiratory Nursing

Children's Respiratory Nursing is a comprehensive, patient-centred text providing up-to-date information about the contemporary management of children with respiratory conditions. It looks at acute and chronic respiratory conditions in both primary and secondary health care sectors and explores the subject from a child- and...

A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
A Comprehensive Evaluation on Emergency Response in China: The Case of Pandemic Influenza (H1N1) 2009 (Research Series on the Chinese Dream and China’s Development Path)
This book is a third-party evaluation of H1N1 prevention and control effects in China. Based on the characteristic of H1N1 pandemic around the world and current public health management system in China, this book evaluates the comprehensive effects by considering the countermeasures, joint prevent and control mechanism operated by central and...
Result Page: 79 78 77 76 75 74 73 72 71 70 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy