Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Assessing Adolescent and Adult Intelligence, Third Edition
Assessing Adolescent and Adult Intelligence, Third Edition
The classic text—now updated with a new interpretive approach to the WAIS®-III

Assessing Adolescent and Adult Intelligence, the classic text from Alan Kaufman and Elizabeth Lichtenberger, has consistently provided the most comprehensive source of information on cognitive assessment of adults and adolescents. The newly updated Third...

Dynamic and Robust Streaming in and between Connected Consumer-Electronic Devices (Philips Research Book Series)
Dynamic and Robust Streaming in and between Connected Consumer-Electronic Devices (Philips Research Book Series)
Dynamic and Robust Streaming in and between Connected Consumer-Electronic Devices addresses a subject that is becoming more important over the years. On the one hand the arrival of home networks is imminent, and on the other hand we notice that chips integrate more and more functionality. The home network interconnects the Consumer...
Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

Clinical Uncertainty in Primary Care: The Challenge of Collaborative Engagement
Clinical Uncertainty in Primary Care: The Challenge of Collaborative Engagement

The Power of Colleagues

What happens when primary care clinicians meet together on set aside time in their practice settings to talk about their own patients? 

.....Complimenting quality metrics or performance measures through discussing the actual stories of individual patients and their...

Spring Security 3.x Cookbook
Spring Security 3.x Cookbook

Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.

Overview

  • Learn about all the mandatory security measures for modern day applications using...
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves

Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves is a practical, hands-on discussion of the software estimation, planning, and control process. This includes critical factors that impact estimates, methods for selecting and applying appropriate measures to projects, proper software sizing, and...

Systems Reliability and Failure Prevention (Artech House Technology Management Library)
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
The primary aim of system reliability is the prevention of failures that affect the operational capability of a system. The probability of such failures can be reduced by the following:

• Conservative design—such as ample margins, use of parts and materials with established operating experience, and observing environmental
...
Performance Driven IT Management: Five Practical Steps to Business Success
Performance Driven IT Management: Five Practical Steps to Business Success

"Despite spending more than $600 billion on information technology over the past decade, the Federal Government has achieved little of the productivity improvements that private industry has realized from IT" according to the 25 Point Implementation Plan to Reform Federal Information Technology Management published by the...

How to Understand Business Finance (Sunday Times Creating Success)
How to Understand Business Finance (Sunday Times Creating Success)

The modern marketplace is increasingly unpredictable and there is an ever-greater need for non-financial managers to understand the financial and management accounting process.

How to Understand Business Finance is not written by an accountant and actually relates to running a business in a real market.  It
...
Beyond the Market: Designing Nonmarket Accounts for the United States
Beyond the Market: Designing Nonmarket Accounts for the United States
One of the long-standing goals of the Committee on National Statistics (CNSTAT) is the improvement of economic measurement and the data sources crucial to that measurement. In working toward that goal, recent CNSTAT panels have produced reports on price and cost-of-living indexes, poverty measurement, measurement of the economy’s government...
Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy