Home | Amazing | Today | Tags | Publishers | Years | Search 
Usability Testing of Medical Devices
Usability Testing of Medical Devices

To paraphrase a popular saying, usability testing should be done early and often. However, it doesn’t have to be an onerous process. Informative, practical, and engaging, Usability Testing of Medical Devices provides a simple, easy to implement general understanding of usability testing. It offers a general...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Hyperspectral Imaging: Techniques for Spectral Detection and Classification
Hyperspectral Imaging: Techniques for Spectral Detection and Classification

Hyperspectral Imaging: Techniques for Spectral Detection and Classification is an outgrowth of the research conducted over the years in the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County. It explores applications of statistical signal processing to hyperspectral...

Internet Security Dictionary
Internet Security Dictionary
Recent years have seen an explosive growth of the Internet. When the Internet passed from government and academic realms to the public sector, it brought along a laissez-faire attitude about security. Its explosive growth, flaws in its basic structure, its facilitation of instant access to information repositories, and its...
Systems and Software Engineering with Applications
Systems and Software Engineering with Applications

By way of this book, Norman Schneidewind has officially bridged the gap between the two disparate fields. Filled with many real-world examples drawn from industry and government, Systems and Software Engineering with Applications provides a new perspective for systems and software engineers to consider when developing optimal solutions. This...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

The Silver Bull Market: Investing in the Other Gold
The Silver Bull Market: Investing in the Other Gold

From one of the world's most respected authorities on precious metals investment--a thoroughly researched volume on the investment prospects for silver, the other gold.

  After outperforming virtually all other investments for more than a decade, gold is being reincorporated into the financial
...

Master Techniques in Orthopaedic Surgery: Fractures
Master Techniques in Orthopaedic Surgery: Fractures
American medicine remains in the midst of a profound and wrenching transformation. The government, Wall Street, third party payers, and patients have demanded improved medical care at lower cost. Better medicine (orthopaedics) occurs when doctors practice medicine consistently on the basis of the best scientific evidence...
Collaborate or Perish!: Reaching Across Boundaries in a Networked World
Collaborate or Perish!: Reaching Across Boundaries in a Networked World

In Collaborate or Perish! former Los Angeles police chief and New York police commissioner William Bratton and Harvard Kennedy School’s Zachary Tumin lay out a field-tested playbook for collaborating across the boundaries of our networked world. Today, when everyone is connected, collaboration is the game changer. Agencies and...

Atlas of Cardiometabolic Risk
Atlas of Cardiometabolic Risk
Cardiovascular disease is the leading cause of death and disability worldwide. Although our understanding of this disease has progressed enormously, we have much to improve in identification of the disease and applying optimal treatments to prevent progression of disease and its consequences.

Beginning
...
Encyclopedia of Space Science & Technology 2 Volume Set
Encyclopedia of Space Science & Technology 2 Volume Set

A comprehensive resource on the past, present, and future of space technology

Researchers in optics, materials processing, and telecommunications require a reference that can provide a quick study of a number of basic topics in space science. The two-volume Encyclopedia of Space Science and Technology represents an ambitious
...

Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy