Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Eeg Interpretation
Handbook of Eeg Interpretation

EEG interpretation is a critical skill for most practicing neurologists, as well as for an increasing number of specialists in other practice settings. Handbook of EEG Interpretation, the first illustrated, portable handbook to discuss all aspects of clinical neurophysiology, is an essential means of quick reference for anyone involved in EEG...

Cancer Cell Signaling: Methods and Protocols (Methods in Molecular Biology)
Cancer Cell Signaling: Methods and Protocols (Methods in Molecular Biology)

Cells respond to environmental cues through a complex and dynamic network of signaling pathways that normally maintain a critical balance between cellular proliferation, differentiation, senescence, and death. One current research challenge is to identify those aberrations in signal transd- tion that directly contribute to a loss of this...

Computer Networking
Computer Networking
Welcome to the eighth edition of Computer Networking: A Top-Down Approach. Since the publication of the first edition 20 years ago, our book has been adopted for use at many hundreds of colleges and universities, translated into 14 languages, and used by many hundreds of thousands students and practitioners worldwide. We’ve...
Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

Pro SQL Server 2005
Pro SQL Server 2005
This book provides a critical examination of all of the major new functionality in SQL Server 2005,
covering such diverse topics as CLR integration, the new management tools, SQL Server Integration
Services, Service Broker, Transact-SQL (T-SQL) programming, and database mirroring.

The book does not profess or even try to be a
...
The Six Sigma Project Planner : A Step-by-Step Guide to Leading a Six Sigma Project Through DMAIC
The Six Sigma Project Planner : A Step-by-Step Guide to Leading a Six Sigma Project Through DMAIC

Meet your Six Sigma project goals--on time and on budget

Six Sigma demands results. These results are delivered by projects that are tightly linked to customer demands and enterprise strategy. If you're leading a Six Sigma initiative in your organization, this hands-on guide is designed to help you achieve these...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications

Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager...

High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face
High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face

Traditionally, human resources has focused on recruiting good people, preparing them for assignments, motivating them to perform, and retaining them. These functions remain essential, but to be successful in turbulent times like ours, human capital strategy needs to be broader and much more far-reaching. High-Impact Human Capital Strategy...

unlimited object storage image
Result Page: 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy