Home | Amazing | Today | Tags | Publishers | Years | Search 
Deep Vein Thrombosis and Pulmonary Embolism
Deep Vein Thrombosis and Pulmonary Embolism

Dedicated to dealing with a challenging disease, previously thought to be incurable, but with the advent of new drugs, now amenable to management and a much improved prognosis for patients.

- Latest publication in a fast-moving area of keen clinical interest
- Authored by leading international authorities
...

Iron Metabolism: From Molecular Mechanisms to Clinical Consequences
Iron Metabolism: From Molecular Mechanisms to Clinical Consequences

Iron is of fundamental importance to the growth, development and well-being of almost all living organisms. Multiple biological systems have evolved for the uptake, utilisation, storage, and homeostasis of iron in microbes, plants and mammals. Both iron deficiency and iron overload are found extensively in humans; the intimate links between...

Designing the iPhone User Experience: A User-Centered Approach to Sketching and Prototyping iPhone Apps
Designing the iPhone User Experience: A User-Centered Approach to Sketching and Prototyping iPhone Apps

Given the fiercely competitive state of the iPhone app landscape, it has become increasingly challenging for app designers and developers to differentiate their apps. The days are long gone when it was possible to crank out an app over the weekend and refine it after receiving a few not so flattering user reviews....

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)
Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)

Grid Computing was a vision of using and sharing computers and data in the early 1990s. The integration, coordination, and sharing of computer resources which are geographically disperse among different physical domains and organizations became an every day reality. This emerging infrastructure aims to provide a mechanism for sharing...

The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)
The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation (Springer Texts in Statistics)

The main purpose of statistical theory is to derive from observations of a random phenomenon an inference about the probability distribution underlying this phenomenon. That is, it provides either an analysis (description) of a past phenomenon, or some predictions about a future phenomenon of a similar nature. In this book, we insist...

Bioassay Techniques for Drug Development
Bioassay Techniques for Drug Development

The so-called “green wave”, triggered by a growing ecological awareness, has resulted in an increased interest in herbal formulations throughout the world, particularly in the last decade. The consumption of medicinal plants has almost doubled in the West during that period. The efficacy of a number of herbal formulations...

Food Chemical Risk Analysis (Food Science & Safety Series)
Food Chemical Risk Analysis (Food Science & Safety Series)

The recognition that chemicals in food, whatever their origin, might present a risk to the consumer has long been recognised. However, early food regulations at the beginning of the century were primarily aimed at prevention of adulteration and fraud rather than directed at consumer safety. It is only in the second half of the century...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy