Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use

Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of...

Computer Science Distilled: Learn the Art of Solving Computational Problems
Computer Science Distilled: Learn the Art of Solving Computational Problems

A walkthrough of computer science concepts you must know. Designed for readers who don't care for academic formalities, it's a fast and easy computer science guide. It teaches the foundations you need to program computers effectively. After a simple introduction to discrete math, it presents common algorithms and data structures. It...

Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention
Unstructured Data Analytics: How to Improve Customer Acquisition, Customer Retention, and Fraud Detection and Prevention

Turn unstructured data into valuable business insight

Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructured data analysis (UDA) concepts in a practical way, highlighting...

Data Mining: Concepts, Models and Techniques (Intelligent Systems Reference Library)
Data Mining: Concepts, Models and Techniques (Intelligent Systems Reference Library)

Data Mining represents a complex of technologies that are rooted in many disciplines: mathematics, statistics, computer science, physics, engineering, biology, etc., and with diverse applications in a large variety of different domains: business, health care, science and engineering, etc. Basically, data mining can be seen as the science of...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Becoming a Better Programmer: A Handbook for People Who Care About Code
Becoming a Better Programmer: A Handbook for People Who Care About Code

If you’re passionate about programming and want to get better at it, you’ve come to the right source. Code Craft author Pete Goodliffe presents a collection of useful techniques and approaches to the art and craft of programming that will help boost your career and your well-being.

Goodliffe presents sound...

2500 Keywords to Get You Hired
2500 Keywords to Get You Hired

Make that important first cut with a resume that packs a punch with 2500 Keywords to Get You Hired

What's in a word? When used effectively on your resume, the right words could land you your next job! 2500 Keywords to Get You Hired breaks down the buzz on buzzwords-those powerful little...

The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling

Updated new edition of Ralph Kimball's groundbreaking book on dimensional modeling for data warehousing and business intelligence!

The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Essential Oils 101: Your Guide to Understanding and Using Essential Oils
Essential Oils 101: Your Guide to Understanding and Using Essential Oils

Learn the effective, natural way to care for your family and home!

From clary sage and eucalyptus to lavender and ylang ylang, essential oils are safe, environmental alternatives to traditional medicine and home-care products. But where do you start?

Inside, you'll find detailed profiles that
...

Williams Textbook of Endocrinology, 11e
Williams Textbook of Endocrinology, 11e

In your complex and dynamic field, it can be a struggle to continually integrate the latest scientific and clinical information into your everyday patient care. The 11th Edition of this beloved reference is the solution! Leading authorities provide just the right blend of scientific insight and clinical know-how to help you overcome any...

Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
Result Page: 88 87 86 85 84 83 82 81 80 79 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy