Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Learning WML and WMLScript
Learning WML and WMLScript
The next generation of mobile communicators is here, and delivering content to them will mean programming in WML (Wireless Markup Language) and WMLScript, the languages of the Wireless Application Environment (WAE). The WAE allows information in almost all applications to be formatted for display on mobile devices, such as cell phones, and...
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)

Medical imaging has been transformed over the past 30 years by the advent of computerized tomography (CT), magnetic resonance imaging (MRI), and various advances in x-ray and ultrasonic techniques. An enabling force behind this progress has been the (so far) exponentially increasing power of computers, which has made it practical to explore...

Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
The use of computed tomography (CT) has seen enormous growth over the past decade. In the US, approximately 63 million examinations were performed in 2005 (Niagara Health Quality Coalition 2004) compared to 35 million in 2000. The increased number of clinical applications (e.g., in emergency and trauma, paediatric, cardiac, and...
Multiple Sclerosis (World Federation of Neurology Seminars in Clinical Neurology) (World Federation of Neurology Series)
Multiple Sclerosis (World Federation of Neurology Seminars in Clinical Neurology) (World Federation of Neurology Series)

"The Multiple Sclerosis International Foundation estimates that over 2.5 million people worldwide have multiple sclerosis. Throughout developed countries, increased attention has been paid to this disorder, due in large part to advanced imaging technology and the development of new therapeutic pharmaceutical agents.

...

SQL Server Execution Plans
SQL Server Execution Plans
Every day, out in the various online forums devoted to SQL Server, and on Twitter, the same types of questions come up repeatedly: Why is this query running slowly? Why is SQL Server ignoring my index? Why does this query run quickly sometimes and slowly at others? My response is the same in each case: have you looked at the execution plan? An...
Ubuntu Server Administration (Network Professional's Library)
Ubuntu Server Administration (Network Professional's Library)
The market for Linux servers has been growing steadily over the past decade. Based on server revenues, in the year 2000, the market for Linux servers was around US $1.5 billion. In 2007, International Data Corporation (IDC) confirmed that the market for Linux servers was US $21 billion.

IDC projects that the Linux server market will grow
...
Graphics Gems Iv/Book and Mac Version Disk (The Graphics Gems Series) (No.4)
Graphics Gems Iv/Book and Mac Version Disk (The Graphics Gems Series) (No.4)

We make images to communicate. The ultimate measure of the quality of our images is how well they communicate information and ideas from the creator’s mind to the perceiver’s mind. The efficiency of this communication, and the quality of our image, depends on both what we want to say and to whom we intend to say it. I believe that...

Home Networking Basis: Transmission Environments and Wired/Wireless Protocols
Home Networking Basis: Transmission Environments and Wired/Wireless Protocols

This complete technical guide to home network media, protocols, and implementation is the first systematic technical guide to all leading transmission media and communication protocols for in-home networking.

Using detailed simulation techniques provided as MATLAB files and SIMULINK models (downloadable from the companion website),...

Pragmatic Unit Testing in C# with NUnit, 2nd Edition
Pragmatic Unit Testing in C# with NUnit, 2nd Edition
The NIST estimates that poor testing costs the US economy $60 billion annually. This book gives teams straightforward and proven ways to introduce unit testing into their process, resulting in higher quality and fewer bugs.

All over the world, software teams are using unit testing both to verify their code and as a way of helping them design...

Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Apple Pro Training Series: Logic Pro 9 and Logic Express 9
Apple Pro Training Series: Logic Pro 9 and Logic Express 9

Completely revised and updated for Logic Pro 9 and Logic Express 9, this Apple-certified guide shows you how to record, produce, and polish music files with Apple’s professional audio software. Veteran music producer David Nahmani’s step-by-step, instructions teach you everything from basic music creation to advanced production...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy