Home | Amazing | Today | Tags | Publishers | Years | Search 
Bipolar Depression: A Comprehensive Guide
Bipolar Depression: A Comprehensive Guide

Although depression is the most common presentation of bipolar disorder, correct diagnosis generally requires a history of mania and thus presents a formidable challenge. This book provides clinicians with the necessary guidance to distinguish this illness and pursue an appropriate therapeutic course. It brings together a team of clinical...

Microservices From Day One: Build robust and scalable software from the start
Microservices From Day One: Build robust and scalable software from the start

Learn what a microservices architecture is, its advantages, and why you should consider using one when starting a new application. The book describes how taking a microservices approach from the start helps avoid the complexity and expense of moving to a service-oriented approach after applications reach a critical code base size or...

Developing Microservices with Node.js
Developing Microservices with Node.js

Key Features

  • Real world example explained chapter after chapter with code examples.
  • Useful concepts for other languages like Java or PHP
  • Easy to follow by people with little to none experience in Node.js
  • Node.js Version 0.12.2 and the latest compatible versions of Seneca and...
Horace Poolaw, Photographer of American Indian Modernity
Horace Poolaw, Photographer of American Indian Modernity

Laura E. Smith unravels the compelling life story of Kiowa photographer Horace Poolaw (1906–84), one of the first professional Native American photographers. Born on the Kiowa reservation in Anadarko, Oklahoma, Poolaw bought his first camera at the age of fifteen and began taking photos of family, friends, and noted leaders in...

A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R
A Data Scientist's Guide to Acquiring, Cleaning, and Managing Data in R

The only how-to guide offering a unified, systemic approach to acquiring, cleaning, and managing data in R

Every experienced practitioner knows that preparing data for modeling is a painstaking, time-consuming process. Adding to the difficulty is that most modelers learn the steps involved in cleaning and managing data...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Manipulation Under Anesthesia
Manipulation Under Anesthesia

Spinal manipulation under anesthesia (MUA) is a procedure intended for patients who suffer from musculoskeletal disorders in conjunction with biomechanical dysfunction. Performed using monitored anesthesia care, this technique is overcoming its controversial image and receiving regular use by a great number of practitioners.

...

Forensic Emergency Medicine (Board Review Series)
Forensic Emergency Medicine (Board Review Series)

Updated for its Second Edition, this text provides the information emergency departments need about the medicolegal aspects of treating victims of violence, motor vehicle accidents, sexual assault, child abuse, elder abuse, and intimate partner abuse. It offers detailed guidelines on interviewing and examining the victim and...

Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life
Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life

Speak directly to your system. With its simple commands, flags, and parameters, a well-formed command-line application is the quickest way to automate a backup, a build, or a deployment and simplify your life. With this book, you'll learn specific ways to write command-line applications that are easy to use, deploy, and maintain, using a...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Good Habits for Great Coding: Improving Programming Skills with Examples in Python
Good Habits for Great Coding: Improving Programming Skills with Examples in Python

Improve your coding skills and learn how to write readable code. Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more. 

Taking an informal, conversational tone,...

Transact-SQL Server User Defined Functions
Transact-SQL Server User Defined Functions
User-defined functions (UDFs) are new in SQL Server 2000. This book examines the various types of UDFs and describes just about everything that you’ll ever want to know in order to make the most of this new feature.

In particular, we’ll cover:  - The different types of UDFs  - Creating UDFs
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy