Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Journey towards Patient-Centered Healthcare Quality: Patients, Families and Caregivers, Voices of Transformation
A Journey towards Patient-Centered Healthcare Quality: Patients, Families and Caregivers, Voices of Transformation
This book provides valuable insight into emerging trends in healthcare delivery; patient, family and caregiver engagement and the intersection of the two. It is unique in that it not only incorporates patient’s voice but provides context in the application of patients’ families and caregivers in...
Introduction to Parallel Computing (Oxford Texts in Applied and Engineering Mathematics)
Introduction to Parallel Computing (Oxford Texts in Applied and Engineering Mathematics)
In the last few years, courses on parallel computation have been developed and offered in many institutions in the UK, Europe and US as a recognition of the growing significance of this topic in mathematics and computer science. There is a clear need for texts that meet the needs of students and lecturers and this book, based on the author's...
Verification Techniques for System-Level Design (Systems on Silicon)
Verification Techniques for System-Level Design (Systems on Silicon)
A must-read in formal and semi-formal verification!

This book will explain how to verify SoC logic designs using formal and semi-formal verification techniques. The critical issue to be addressed is whether the functionality of the design is the one that the designers intended. Simulation has been used for checking the
...
Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Eleventh Hour Security+: Exam SY0-201 Study Guide
Eleventh Hour Security+: Exam SY0-201 Study Guide

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. ...

Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)
Breast Cancer: Translational Therapeutic Strategies (Translational Medicine)

Considering the impact of translational breakthroughs on the early detection, diagnosis, prevention, and treatment of breast cancer, this all-encompassing guide collects cutting-edge research on the most promising strategies and agents likely to impact the management and long-term outcomes of women with breast cancer. This book will provide...

Clinical Epidemiology: Practice and Methods (Methods in Molecular Biology)
Clinical Epidemiology: Practice and Methods (Methods in Molecular Biology)

Focusing on improving the diagnosis, prognosis, and management of human disease, this book takes on the issues of research design, measurement, and evaluation which are critical to clinical epidemiology. This second edition of Clinical Epidemiology: Practice and Methods opens with how best to frame a clinical research question, the...

The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal
The Power of Full Engagement: Managing Energy, Not Time, Is the Key to High Performance and Personal Renewal

We live in digital time. Our pace is rushed, rapid-fire, and relentless. Facing crushing workloads, we try to cram as much as possible into every day. We're wired up, but we're melting down. Time management is no longer a viable solution. As bestselling authors Jim Loehr and Tony Schwartz demonstrate in this groundbreaking book,...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Building Applications with Microsoft® Outlook® Version 2002
Building Applications with Microsoft® Outlook® Version 2002

This book is designed primarily for Microsoft Outlook application developers using Microsoft Exchange Server. Many of the examples assume that you’ll be deploying workgroup applications in an Exchange Server environment using both public and private folders. It’s also assumed that you’ll be using Outlook 2002 to run the...

Encyclopedia of Communities of Practice in Information and Knowledge Management
Encyclopedia of Communities of Practice in Information and Knowledge Management
"This encyclopedia has a breadth and depth that makes it a valuable reference work for anyone." --Prof. Miles Nicholls, RMIT University, Australia

The Encyclopedia of Communities of Practice in Information and Knowledge Management is the leading reference source for dynamic and innovative research in the field of
...
Design Through Verilog HDL
Design Through Verilog HDL
A comprehensive resource on Verilog HDL for beginners and experts

Large and complicated digital circuits can be incorporated into hardware by using Verilog, a hardware description language (HDL). A designer aspiring to master this versatile language must first become familiar with its constructs, practice their use in real applications, and...

unlimited object storage image
Result Page: 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy