Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development, Third Edition
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development, Third Edition

Applying UML and Patterns is the world's #1 business and college introduction to "thinking in objects"and using that insight in real-world object-oriented analysis and design. Building on two widely acclaimed previous editions, Craig Larman has updated this book to fully reflect the new...

Digital Signal Processing
Digital Signal Processing
An up-to-the-minute textbook for junior/senior level signal processing courses and senior/graduate level digital filter design courses, this text is supported by a DSP software package known as D-Filter which would enable students to interactively learn the fundamentals of DSP and digital-filter design. The book includes a free license to...
Ubiquitous Computing
Ubiquitous Computing

Near Field Communication (NFC) technology has become increasingly important for ubiquitous computing. Florian Resatsch investigates the optimal strategies for developing and evaluating ubiquitous computing applications based on NFC. He draws on a variety of current theories on ubiquitous computing, human-computer interaction, and technology...

Creating Apps in Kivy
Creating Apps in Kivy

Build mobile apps efficiently with Kivy, the Python-powered graphical toolkit for creating natural user interfaces with elegant multitouch support. With this hands-on guide, you’ll learn step-by-step how to build and deploy a complete Kivy app for iOs and Android devices. If you’re just beginning to work with Python, but...

Design Sensitivity Analysis and Optimization of Electromagnetic Systems (Mathematical and Analytical Techniques with Applications to Engineering)
Design Sensitivity Analysis and Optimization of Electromagnetic Systems (Mathematical and Analytical Techniques with Applications to Engineering)

This book presents a comprehensive introduction to design sensitivity analysis theory as applied to electromagnetic systems. It treats the subject in a unified manner, providing numerical methods and design examples. The specific focus is on continuum design sensitivity analysis, which offers significant advantages over discrete...

The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
Advanced Wireless Communications: 4G Technologies
Advanced Wireless Communications: 4G Technologies
The wireless community is on the verge of the standardization of fourth generation (4G) systems.  Research has generated a number of solutions for significant improvement of system performance.  The development of enabling technologies such as adaptive coding and modulation, iterative (turbo) decoding algorithms and space-time coding,...
Map-based Mobile Services: Design, Interaction and Usability (Lecture Notes in Geoinformation and Cartography)
Map-based Mobile Services: Design, Interaction and Usability (Lecture Notes in Geoinformation and Cartography)
The worldwide popularisation of mobile communication technologies and the increasing awareness of usability issues since 1990’s have been urging map designers to specialise and extend cartographic semiotics, visualisation styles and map use techniques for mobile contexts and small display devices. As a follow-up to the first book...
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
"No present book comes near this one in the range and depth of treatment of these two extremely important methods—the Lanczos algorithm and the method of conjugate gradients." Chris Paige, School of Computer Science, McGill University.   The Lanczos and conjugate gradient (CG) algorithms are fascinating numerical...
Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner introduces the readers to data mining using SAS Enterprise Miner v4. This book will reveal the power and ease of use of the powerful new module in SAS that will introduce the readers to the various configuration settings and subsequent results that are generated from the various nodes in Enterprise Miner that...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy