Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a...
Studies published before the introduction of highly active antiretroviral therapy (HAART) tracked the incidence and course of HIV infection in relation to cardiac illness in both children and adults. These studies show that subclinical echocardiographic abnormalities independently predict adverse outcomes and identify high-risk groups to be...
Have you been considering a career change and thinking about becoming a SQL Server DBA
(database administrator)? Perhaps you've been given the responsibility oflooking after a SQJ. Server
and you aren't quite sure what this really means or where you should start? Maybe you're just
interested in finding out what on earth...
Detailed yet accessible, Java™ Rules is a comprehensive reference for the application programmer who needs to master the intricacies of the Java™ programming language. Thoroughly describing the core of the Java programming language and the Java™ virtual machine (JVM™), Java™ Rules makes it...
The field of digital computer architecture has grown explosively in the past two decades.
Through a steady stream of experimental research, tool-building efforts, and theoretical
studies, the design of an instruction-set architecture, once considered an art, has been
transformed into one of the most quantitative branches of...
The original Handbook of Evolutionary Computation (Back et a1 1997) was
designed to fulfil1 the need for a broad-based reference book reflecting the
important role that evolutionary computation plays in a variety of disciplinesranging
from the natural sciences and engineering to evolutionary biology and
computer...
This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!
The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers...
Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...
I’ve been using SQL Server for longer than I care to admit. Let’s just say that I remember the days when Microsoft first released its own version of SQL Server after obtaining the rights to it from Sybase Corporation. That was a long time ago!
Why have I been using SQL Server for such a long time? Quite simply, I...
Mobile applications come in two basic flavors: native applications, which are compiled
programs that run natively on the device, and mobile web applications, which run
inside a web browser on the device.
Native applications get almost all of the press these days, especially given the financial
success of the iTunes App Store...
Since this third volume of Essentials has been compiled the arena of autopsy practice
is undoubtedly changing. For the first time pathologists are beginning to opt
out of autopsy training which will reduce the number of practitioners and result in
centralisation of autopsy services. With the increase of knowledge, availability and...
Philosopher Kings? The Adjudication of Conflicting Human Rights and Social Values, by George C. Christie, examines the attempts by courts to sort out conflicts involving freedom of expression, including religious expression, on the one hand, and rights to privacy and other important social values on the other. It...