Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MRI Handbook: MR Physics, Patient Positioning, and Protocols
MRI Handbook: MR Physics, Patient Positioning, and Protocols

This book presents a concise review of the physical principles underlying magnetic resonance imaging (MRI), explaining MR physics, patient positioning, and protocols. Separate chapters cover the central nervous, musculoskeletal, and cardiovascular systems.

...
C++ in a Nutshell
C++ in a Nutshell

C++ in a Nutshell packs an enormous amount of information on C++ (and the many libraries used with it) in an indispensable quick reference for those who live in a deadline-driven world and need the facts but not the frills. Cross-references link related methods, classes, and other key features. This is an...

MCSE Training Kit—Microsoft Windows 2000 Network Infrastructure Administration
MCSE Training Kit—Microsoft Windows 2000 Network Infrastructure Administration
Welcome to the MCSE Training Kit—Microsoft Windows 2000 Network Infrastructure Administration. This book will teach you how to plan your network infrastructure around features supported by Windows 2000. Issues such as network protocol and services are introduced and compared based on the requirements of your organization. This...
Building Cisco Remote Access Networks
Building Cisco Remote Access Networks
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID and IP Telephony Design and Implementation
Cisco AVVID Design and Implementation is a complete reference for network administrators and engineers responsible for a complicated AVVID network. This book covers history, protocols, hardware, servers, switches, bridges, and routers, and discusses implementation issues, realities of cost, requirements, and network limitations. Engineers will...
Content Networking in the Mobile Internet
Content Networking in the Mobile Internet

A cutting-edge guide to the next generation Mobile Internet architecture and applications

The last several years have witnessed dramatic changes in the wireless Web interface environment, specifically in the way that content is stored, distributed, and checked for consistency while leveraging location awareness. This phenomenon is...

Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

Pyrosequencing Protocols (Methods in Molecular Biology)
Pyrosequencing Protocols (Methods in Molecular Biology)

This book presents detailed protocols for the multidisciplinary application of Pyrosequencing® technology, all written by world-renowned experts. This comprehensive volume enables quick reference by collecting the primary applications for Pyrosequencing®, and supplementing each protocol with troubleshooting tips specific to that...

Breast Cancer Research Protocols (Methods in Molecular Medicine)
Breast Cancer Research Protocols (Methods in Molecular Medicine)

A collection of both well-established and cutting-edge methods for investigating breast cancer biology not only in the laboratory, but also in clinical settings. These readily reproducible techniques solve a variety of problems, ranging from how to collect, store, and prepare human breast tumor samples for analysis, to analyzing cells in vivo...

VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
unlimited object storage image
Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy