Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Intelligent Automation and Systems Engineering (Lecture Notes in Electrical Engineering)
Intelligent Automation and Systems Engineering (Lecture Notes in Electrical Engineering)

Intelligent systems are required to facilitate the use of information provided by the internet and other computer based technologies. This book describes the state-of-the-art in Intelligent Automation and Systems Engineering. Topics covered include Intelligent decision making, Automation, Robotics, Expert systems, Fuzzy systems,...

Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
In the second half of the 20th century innate immune responses of cellular or humoral type were treated like stepchildren by many immunologists: that is, somewhat neglected. This disregard turned into an exciting research field over the past several years and led to the identification of receptor families involved in the recognition...
Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Handbook of Anticancer Pharmacokinetics and Pharmacodynamics (Cancer Drug Discovery and Development)
Handbook of Anticancer Pharmacokinetics and Pharmacodynamics (Cancer Drug Discovery and Development)

Leading investigators synthesize the entire laboratory and clinical process of developing anticancer drugs to create a single indispensable reference that covers all the steps from the identification of cancer-specific targets to phase III clinical trials. These expert authors provide their best guidance on a wide variety of issues, including...

Genetic Toxicology and Cancer Risk Assessment
Genetic Toxicology and Cancer Risk Assessment

Presents state-of-the-art regulatory cancer risk assessment models including a biologically based model for two-hit carcinogenesis and cell proliferation!

This book comprehensively reviews the various roles of genetic toxicology in human cancer risk assessment conducted by United States and worldwide regulatory
...

New Techniques in Thoracic Imaging
New Techniques in Thoracic Imaging

Contains nearly 300 high-quality images and diagrams that illustrate the state-of-the-art thoracic imaging such as advanced 2-D and 3-D CT reconstruction methods, FDG-PET imaging, CT nodule enhancement, magnetic resonance angiography and ventilation imaging!

This authoritative reference presents the latest advances in
...

Indian Medicinal Plants: An Illustrated Dictionary
Indian Medicinal Plants: An Illustrated Dictionary
In 2004, Springer-Verlag Heidelberg published C.P.Khares "Encyclopedia of Indian Medicinal Plants" which contained 400 monographs comprising classical as well as contemporary research findings.

"Indian Medicinal Plants. An Illustrated Dictionary" is the second major one-volume reference work by C.P.Khare which has been...

Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Robust Signal Processing for Wireless Communications (Foundations in Signal Processing, Communications and Networking)
Optimization of adaptive signal processing algorithms for wireless communications is based on a model of the underlying propagation channel. In practice, this model is never known perfectly. For example, its parameters have to be estimated and are only known with significant errors.

In this book, a systematic treatment of this practical design...

Cereal Genomics: Methods and Protocols (Methods in Molecular Biology)
Cereal Genomics: Methods and Protocols (Methods in Molecular Biology)

The objective of this volume is to detail current technologies associated with cereal genomics, providing a valuable resource for researchers working in breeding and molecular crop improvement programs. Chapters guide readers through high-throughput DNA extraction protocols, crop genetic resources, meta-Quantitative Trait Loci (QTL)...

Computer Forensics: A Pocket Guide
Computer Forensics: A Pocket Guide

Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy