Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Early Hip Disorders: Advances in Detection and Minimally Invasive Treatment
Early Hip Disorders: Advances in Detection and Minimally Invasive Treatment

As one of the leading specialists in hip arthroscopies, Dr. Joseph McCarthy's text promises to become a definitive addition to the field. Featuring full color, arthroscopic views and contributions from prestigious figures in the orthopaedic community, this text covers all the essentials of hip arthroscopy including: examiniations,...

An Implementation Guide to Compiler Writing
An Implementation Guide to Compiler Writing

An important aspect of teaching a course in compiler writing is to illustrate the key theoretical concepts normally taught in such a course. A frequently used strategy for achieving this goal is to have a student design a simple programming language and implement a compiler for this language. Many texts in compiler writing do not,...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Autodesk AutoCAD 2013 Practical 3D Drafting and Design
Autodesk AutoCAD 2013 Practical 3D Drafting and Design

Autodesk AutoCAD is, by far, the most used CAD software all around the world. In 2D it includes a large number of commands and functions, which makes it virtually unbeatable for many years. With continuous hardware development, together with new software capabilities, 3D became a viable and accessible technology to all. It is much better to...

Towards Safe Robots: Approaching Asimov’s 1st Law (Springer Tracts in Advanced Robotics)
Towards Safe Robots: Approaching Asimov’s 1st Law (Springer Tracts in Advanced Robotics)

The vision of seamless human-robot interaction in our everyday life that allows for tight cooperation between human and robot has not become reality yet. However, the recent increase in technology maturity finally made it possible to realize systems of high integration, advanced sensorial capabilities and enhanced power to cross this barrier...

Microsoft Azure Security Center (IT Best Practices - Microsoft Press)
Microsoft Azure Security Center (IT Best Practices - Microsoft Press)
Welcome to Azure Security Center, Third Edition—a book that was developed together with the Azure Security Center product group to provide in-depth information about Azure Security Center and Azure Defender, to demonstrate best practices based on real-life experience with the product in different environments.
...
Concurrent and Distributed Computing in Java
Concurrent and Distributed Computing in Java

An in-depth introduction to concurrent and distributed computing with Java

Combining the two key types of Java programming, Concurrent and Distributed Computing in Java offers both professionals and students a comprehensive guide to fundamental concepts necessary for mastering Java programming.

The text is presented in...

Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Atlas of Colonoscopy: Examination Techniques and Diagnosis
Atlas of Colonoscopy: Examination Techniques and Diagnosis
A complete guide to colonoscopy featuring more than 1,000 superb illustrations!

In recent decades, colonoscopy has developed into one of the most essential techniques for early screening, detection, and diagnosis of colorectal cancer, inflammatory bowel disease, and other disorders. And rapid advances in interventional endoscopy...

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

unlimited object storage image
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy