Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Functional Interfaces in Java: Fundamentals and Examples
Functional Interfaces in Java: Fundamentals and Examples
Reduce development time by organizing your programs as chains of functional interfaces and see that the advantages of using functional interfaces include the flexibility and power of inlined functional chains and reuse of functional methods utilized throughout the Java API. You’ll see how complex logical expressions can be reduced...
Applied Genetic Programming and Machine Learning
Applied Genetic Programming and Machine Learning

This book delivers theoretical and practical knowledge on extension of Genetic Programming (GP) for practical applications. It provides a methodology for  integrating Genetic Programming and machine-learning techniques. The developmentof such tools contributes to the establishment of a more robust evolutionary framework when addressing...

Bass Guitar for Dummies
Bass Guitar for Dummies
Shake the earth with deep, sonorous vibrations. Be the force that relentlessly drives the music. Rumble like the ominous thunder of an approaching storm. For you, it's not enough just to be heard; you need to be felt, too. You need to play bass guitar.

Imagine your favorite music without bass. It doesn't work, does it? The bass is...

The Oxford Guide to English Usage
The Oxford Guide to English Usage
Have you ever had doubts about when to hyphenate two words? Confused over whether you should disassociate or dissociate yourself from something? Do you know when to spell doggie as doggy? Is it really a rule that a preposition should never fall at the end of a sentence? Now there is a single
convenient source you can turn to with all your
...
Hands-On Artificial Intelligence with Java for Beginners: Build intelligent apps using machine learning and deep learning with Deeplearning4j
Hands-On Artificial Intelligence with Java for Beginners: Build intelligent apps using machine learning and deep learning with Deeplearning4j

Build, train, and deploy intelligent applications using Java libraries

Key Features

  • Leverage the power of Java libraries to build smart applications
  • Build and train deep learning models for implementing artificial intelligence
  • Learn various algorithms to...
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
The rapidly growing amount of data, available from different technologies in the field of bio-sciences, high-energy physics, economy, climate analysis, and in several other scientific disciplines, requires a new generation of machine learning and statistical methods to deal with their complexity and heterogeneity. As data collections becomes...
CSS Cookbook, 3rd Edition (Animal Guide)
CSS Cookbook, 3rd Edition (Animal Guide)

What people are saying about CSS Cookbook

"Christopher's fantastic cookbook will give you solutions to pretty much all of the CSS problems you'll come up against in your day-to-day web design work, saving you bags of time and frustration. This guy is one of the industry's brightest minds --...

Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Nowadays data accumulate at an alarming speed in various storage devices,
and so does valuable information. However, it is difficult to understand information
hidden in data without the aid of data analysis techniques, which
has provoked extensive interest in developing a field separate from machine
learning. This new field is
...
Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
A practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and...
Visual Basic .NET Power Tools
Visual Basic .NET Power Tools

We can ask heretical questions such as why OOP should be used in all programming situations as many of its proponents insist. We can question the wisdom of allowing C programmers to write the narratives and code examples for the Help system in VB.NET. We can wonder why structures are included in VB.NET if OOP experts insist that you should...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Result Page: 23 22 21 20 19 18 17 16 15 14 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy