Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Endoscopic Sinus Surgery Dissection Manual: A Stepwise: Anatomically Based Approach to Endoscopic Sinus Surgery
Endoscopic Sinus Surgery Dissection Manual: A Stepwise: Anatomically Based Approach to Endoscopic Sinus Surgery

This reference presents effective strategies to locate key anatomical structures during endoscopic sinus surgery (ESS)-offering proven methods to determine location when facing complications and distortions in tissues of the ear, nose, and throat due to inflammation, prior treatment, and disease.

Contains a CD-ROM providing
...

Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing
Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing

Artificial intelligence (AI) has been in existence almost as long as computers. However, only recently have AI techniques been widely incorporated by companies to enhance

traditional business applications.

Building Intelligent .NET Applications is...

CCIE Routing and Switching Practice Labs
CCIE Routing and Switching Practice Labs

Six comprehensive CCIE routing and switching labs to hone configuration and troubleshooting skills

Prepare for the CCIE lab exams and hone your configuration and troubleshooting skills with six complete practice scenarios that cover:

  • Frame Relay...

CMOS PLL Synthesizers: Analysis and Design (The International Series in Engineering and Computer Science)
CMOS PLL Synthesizers: Analysis and Design (The International Series in Engineering and Computer Science)
Thanks to the advance of semiconductor and communication technology,
the wireless communication market has been booming in the last two
decades. It evolved from simple pagers to emerging third-generation (3G)
cellular phones. In the meanwhile, broadband communication market has
also gained a rapid growth. As the market always
...
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection

This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve,...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Handbook of Preventive Interventions for Adults
Handbook of Preventive Interventions for Adults
A complete and current overview of preventive interventions and programs for adults

More than at any time in our history, people are living longer. Yet, in many cases, individuals are beset by emotional, physical, and social problems that can erode their quality of life. Whether the issue is obesity, anxiety, or partner violence, all of these...

Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
Reliable Knowledge Discovery
Reliable Knowledge Discovery
With the rapid development of the data mining and knowledge discovery, a key issue which could significantly affect the real world applications of data mining is the reliability issues of knowledge discovery. It is natural that people will ask if the discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
New Directions of Modern Cryptography
New Directions of Modern Cryptography

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...

CCIE Security Practice Labs (CCIE Self-Study)
CCIE Security Practice Labs (CCIE Self-Study)

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...

unlimited object storage image
Result Page: 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy