Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Medical Imaging: Essentials for Physicians
Medical Imaging: Essentials for Physicians

"An excellent primer on medical imaging for all members of the medical profession . . . including non-radiological specialists. It is technically solid and filled with diagrams and clinical images illustrating important points, but it is also easily readable . . . So many outstanding chapters . . . The book uses little mathematics...

Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
"In recent years, comprehensive texts have been written for several of the other major areas of Artificial Intelligence, including machine learning, natural-language processing, and constraint-satisfaction processing, but until now, the field of planning has been devoid of such a resource, despite the considerable number of advances in and the...
Yearbook of Intensive Care and Emergency Medicine 2006
Yearbook of Intensive Care and Emergency Medicine 2006

The Yearbook compiles the most recent developments in experimental and clinical research and practice in one comprehensive reference book. The chapters are written by well recognized experts in the field of intensive care and emergency medicine. It is addressed to everyone involved in internal medicine, anesthesia, surgery, pediatrics,...

GIS For Dummies (Computer/Tech)
GIS For Dummies (Computer/Tech)
GIS (geographic information system) is a totally cool technology that has been called “geography on steroids.” GIS is what lets you see the schools in your neighborhood or tells you where the nearest McDonald’s is. GIS For Dummies tells you all about mapping terminology and digital mapping, how to locate geographic...
Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
This book includes the precautions and procedures that address the concerns of HIPAA, but presents them along with other business components in order to emphasize the need for a holistic approach when constructing and maintaining a business plan.

This book examines business continuity planning as adapted to encompass the requirements of...

Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication
Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication

A mixture of theory, experiments, and simulations that provide qualitative and quantitative insights into the technology

The important new technology of wireless sensor and actuator networks provides radically new communication and networking paradigms with many new applications. Wireless Sensor and Actuator Networks...

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Cisco Routers for the Desperate: Router and Switch Management, the Easy Way
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far.

Just like the original, this second edition of the highly acclaimed Cisco Routers for the...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Toward Scientific Medicine
Toward Scientific Medicine

Scientific medicine in Miettinen’s conception of it is very different from the two ideas about it that come to eminence in the 20th century.  To him, medicine is scientific to the extent that it has a rational theoretical framework and a knowledge-base from medical science.  He delineates the nature of that...

Food Safety
Food Safety
It is estimated that 20 percent of all emergency room visits are due to foodborne illness. As dietary habits change to include more meals prepared away from home, higher consumption of fresh foods, and more imported foods, the risks of foodborne illness change. Food safety procedures that we learned from our parents may not be sufficient to keep us...
Simulating Fuzzy Systems
Simulating Fuzzy Systems
Simulating Fuzzy Systems demonstrates how many systems naturally become fuzzy systems and shows how regular (crisp) simulation can be used to estimate the alpha-cuts of the fuzzy numbers used to analyze the behavior of the fuzzy system. This monograph presents a concise introduction to fuzzy sets, fuzzy logic, fuzzy estimation,...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy