Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use

Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of...

More iPhone Development with Swift: Exploring the iOS SDK
More iPhone Development with Swift: Exploring the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)

The...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Learning OMNeT++
Learning OMNeT++

Make realistic and insightful network simulations with OMNeT++

Overview

  • Create a virtual Network Simulation Environment rapidly
  • Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
  • Learn how to...
Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)
Automatic Design of Decision-Tree Induction Algorithms (SpringerBriefs in Computer Science)

Presents a detailed study of the major design components that constitute a top-down decision-tree induction algorithm, including aspects such as split criteria, stopping criteria, pruning and the approaches for dealing with missing values. Whereas the strategy still employed nowadays is to use a 'generic' decision-tree induction...

Breast Cancer: Nuclear Medicine in Diagnosis and Therapeutic Options
Breast Cancer: Nuclear Medicine in Diagnosis and Therapeutic Options

There can never be enough material in the public domain about cancers, and particularly breast cancer. This book adds much to the literature. It provides general information on breast cancer management and considers all new methods of diagnosis and therapy. It focuses on nuclear medicine modalities by comparing their results with other...

Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)
Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)

Many people find it hard to get on top of their workload.  They constantly bounce from one task to another and struggle to prioritize, which can have a serious impact on productivity.

Organise Yourself helps readers develop effective organizational skills and dramatically improve the way they work. It...

Toxin: The Cunning of Bacterial Poisons
Toxin: The Cunning of Bacterial Poisons

What do the following have in common: the promise of Botox as the key to everlasting youthful looks; E. coli O157 hamburger disease; a mysterious illness which killed 35 heroin users in 2000; and the assassination by poisoned umbrella-tip of a Bulgarian dissident in the 1970s? The answer is that all of these are caused by toxins, the powerful...

Think Perl 6: How to Think Like a Computer Scientist
Think Perl 6: How to Think Like a Computer Scientist

Want to learn how to program and think like a computer scientist? This practical guide gets you started on your programming journey with the help of Perl 6, the younger sister of the popular Perl programming language. Ideal for beginners, this hands-on book includes over 100 exercises with multiple solutions, and more than 1,000 code...

Java Testing with Spock
Java Testing with Spock

Summary

Java Testing with Spock teaches you how to use Spock for a wide range of testing use cases in Java. Readers new to Groovy will appreciate the succinct language tutorial that'll give you just enough Groovy to use Spock effectively.

Purchase of the print book includes a free eBook in PDF,...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Computer Explorations in Signals and Systems Using MATLAB
Computer Explorations in Signals and Systems Using MATLAB
This book provides computer exercises for an undergraduate course on signals and linear systems. Such a course or sequence of courses forms an important part of most engineering curricula. This book was primarily designed as a companion to the second edition of Signals and Systems by Oppenheim and Willsky with Nawab. While the...
unlimited object storage image
Result Page: 1397 1396 1395 1394 1393 1392 1391 1390 1389 1388 1387 1386 1385 1384 1383 1382 1381 1380 1379 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy