Home | Amazing | Today | Tags | Publishers | Years | Search 
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck...

The Incidental Steward: Reflections on Citizen Science
The Incidental Steward: Reflections on Citizen Science

A search for a radio-tagged Indiana bat roosting in the woods behind her house in New York’s Hudson Valley led Akiko Busch to assorted other encounters with the natural world—local ecological monitoring projects, community-organized cleanup efforts, and data-driven citizen science research. Whether it is pulling up water...

REST: From Research to Practice
REST: From Research to Practice

Anybody following the discussions around “Web Services” in recent years is aware of the fuzzy definition of the term, and a little bit of history can quite easily explain some of the confusions around current terminology (or use of terminology). The general idea of using Web technologies to not only deliver Web pages (HTML...

Metaclasses and Their Application: Data Model Tailoring and Database Integration (Lecture Notes in Computer Science)
Metaclasses and Their Application: Data Model Tailoring and Database Integration (Lecture Notes in Computer Science)

Conventional object-oriented data models are "closed". Although they allow users to define application-specific classes, they usually come with a fixed set of modeling primitives. This constitutes a major problem as different application domains have different requirements on a data model. For example, database integration...

Essentials of Computer Architecture
Essentials of Computer Architecture

This book began when I was assigned to help salvage an undergraduate computer organization course. The course had suffered years of neglect: it had been taught by a series of professors, mostly visitors, who had little or no interest or background in digital hardware, and the curriculum had deteriorated to a potpourri of topics that...

Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools

Recently, the rapid and fundamental advances in computing technologies have been driving the role and scope of software systems to a new level. A number of new types of software systems are emerging, among which service based systems, cloud computing, pervasive computing, and Internet of Things are eminent examples. For these systems,...

Understanding Voice Over IP Technology
Understanding Voice Over IP Technology

The technology of voice over IP provides for making telephone calls over data networks such as the Internet and it has now reached critical mass. I know this because as a technology instructor I spend more and more time teaching Voice over IP or “VoIP.” I wrote this book because I couldn’t find any material suitable...

Real-Time Database Systems - Architecture and Techniques
Real-Time Database Systems - Architecture and Techniques

In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity....

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition
Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and...

Fundamentals of Sensor Network Programming: Applications and Technology
Fundamentals of Sensor Network Programming: Applications and Technology

Sensor processing is a central and an important problem in aerospace/defense, automation, medical imaging, and robotics, to name only a few areas. A surveillance system used in aerospace and defense is an example of a sensor processing system. It uses devices such as infrared sensors, microwave radars, and laser radars that are...

Computer Technology Encyclopedia
Computer Technology Encyclopedia

These days, any attempt to write a full-blown encyclopedia or dictionary of computer terminology would be an exercise in futility. New terms and buzzwords appear every day, and information technology fi elds overlap with so many other fi elds it can be hard to determine if a word is IT, telecommunications, or graphics arts, and so on....

Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)
Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)

Grid Computing was a vision of using and sharing computers and data in the early 1990s. The integration, coordination, and sharing of computer resources which are geographically disperse among different physical domains and organizations became an every day reality. This emerging infrastructure aims to provide a mechanism for sharing...

Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy