Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network...

Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings ... and Telecommunications Engineering, 263)
Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings ... and Telecommunications Engineering, 263)

This book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018,  which took place in Faro, Portugal, in September 2018.

The 30 revised full and 16 workshop papers were carefully reviewed and selected from 68
...
Handbook of Oil and Gas Piping: a Practical and Comprehensive Guide
Handbook of Oil and Gas Piping: a Practical and Comprehensive Guide

The objective of this practical oil and gas piping handbook is to facilitate project management teams of oil and gas piping related construction projects to understand the key requirements of the discipline and to equip them with the necessary knowledge and protocol. It provides a comprehensive coverage on all the practical aspects...

The Columbia Guide to Basic Elements of Eye Care: A Manual for Healthcare Professionals
The Columbia Guide to Basic Elements of Eye Care: A Manual for Healthcare Professionals

This unique resource is a practical, easy-to-use guide for the non-ophthalmologist healthcare provider as they encounter patients with eye complaints and other concerning ophthalmic conditions. The Columbia Guide to Basic Elements of Eye Care is specifically designed with the non-ophthalmologist in mind, and provides a...

The Trauma Golden Hour: A Practical Guide
The Trauma Golden Hour: A Practical Guide
The Golden Hour is a well-established concept in emergency medicine, related to the critical period of one hour after an injury, accident or trauma. This term implies that the mortality rates increase substantially if efficient care is not provided within 60 minutes after the trauma. This book is intended as a practical manual in Trauma...
Pilates and Conditioning for Athletes: An Integrated Approach to Performance and Recovery
Pilates and Conditioning for Athletes: An Integrated Approach to Performance and Recovery
Gain the competitive edge with the innovative training methods in Pilates and Conditioning for Athletes. This science-based, multidimensional approach to athletic conditioning helps you build a strong and flexible foundation by infusing Pilates into training, resulting in complete training programs that tap into the seven pillars of...
Computational Methods for Single-Cell Data Analysis (Methods in Molecular Biology)
Computational Methods for Single-Cell Data Analysis (Methods in Molecular Biology)
This detailed book provides state-of-art computational approaches to further explore the exciting opportunities presented by single-cell technologies. Chapters each detail a computational toolbox aimed to overcome a specific challenge in single-cell analysis, such as data normalization, rare cell-type identification, and spatial...
The Massachusetts General Hospital Guide to Learning Disabilities: Assessing Learning Needs of Children and Adolescents (Current Clinical Psychiatry)
The Massachusetts General Hospital Guide to Learning Disabilities: Assessing Learning Needs of Children and Adolescents (Current Clinical Psychiatry)
This book connects experts in the field of child assessment to provide child psychiatrists with knowledge in evaluation and educational programming. The book provides a review of the latest science behind: common learning disabilities, including etiology and guidelines for assessment/diagnosis; neurodevelopmental disorders, like learning...
Predictive Biomarkers in Oncology: Applications in Precision Medicine
Predictive Biomarkers in Oncology: Applications in Precision Medicine
  “Precision/personalized or stratified medicine” refers to the tailoring of medical treatment or drug administration to the individual characteristics of each patient treatment. It does not literally mean that a pharmaceutical company makes a drug for an individual patient for consumption and treatment but rather means the...
The Time-Saver's Workout: A Revolutionary New Fitness Plan that Dispels Myths and Optimizes Results
The Time-Saver's Workout: A Revolutionary New Fitness Plan that Dispels Myths and Optimizes Results
Fitness researcher and pioneer John Little has spent years researching the science underpinning our most prevalent beliefs about exercise and is convinced that we need a new paradigm, one that would involve reliance on briefer workouts. He presents this revolutionary new approach here.

There is something terribly
...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy