Home | Amazing | Today | Tags | Publishers | Years | Search 
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)

Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard...

Handbook of Gastroenterologic Procedures (Lippincott Williams & Wilkins Handbook Series)
Handbook of Gastroenterologic Procedures (Lippincott Williams & Wilkins Handbook Series)

The thoroughly updated and greatly expanded Fourth Edition of the best-selling Manual of Gastroenterologic Procedures covers all diagnostic and therapeutic procedures in current use for adult and pediatric patients. Fifty procedures—both endoscopic and non-endoscopic—are described in a concise, structured,...

The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)

Printed in full color.

To keep doing what you love, you need to maintain your own systems, not just the ones you write code for. Regular exercise and proper nutrition help you learn, remember, concentrate, and be creative--skills critical to doing your job well. Learn how to change your work habits, master exercises
...

Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
The Kock Pouch
The Kock Pouch

This book is about the recently revived technique of Kock pouch in inflammatory bowel disease. It discusses the Kock pouch as an alternative to patients not suitable for a pelvic pouch or where the pelvic pouch has failed. It provides clinicians with all the necessary information on patient guidance and surgical revisions after a...

The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
The Eagle Has Eyes: The FBI Surveillance of César Estrada Chávez of the United Farm Workers Union of America, 1965–1975 (Latinos in the United States)
This book is the first of its kind to bring transparency to the FBI’s attempts to destroy the incipient Chicano Movement of the 1960s. While the activities of the deep state are current research topics, this has not always been the case. The role of the U.S. government in suppressing marginalized racial and ethnic minorities...
Towards Digital Enlightenment: Essays on the Dark and Light Sides of the Digital Revolution
Towards Digital Enlightenment: Essays on the Dark and Light Sides of the Digital Revolution

This new collection of essays follows in the footsteps of the successful volume Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society, published at a time when our societies were on a path to technological totalitarianism, as exemplified by mass surveillance reported by Edward Snowden and...

Premalignant Conditions of the Oral Cavity (Head and Neck Cancer Clinics)
Premalignant Conditions of the Oral Cavity (Head and Neck Cancer Clinics)

Oral squamous cell carcinoma (SCC) is the 13th commonest cancer worldwide, and the most common cancer in the Asian subcontinent due to the widespread habit of tobacco and betel nut chewing. Despite many advances in diagnosis and treatment, the survival statistics have only marginally improved. However our...

Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century (International Political Economy Series)
This book explores the interconnected ways in which the control of knowledge has become central to the exercise of political, economic, and social power. Building on the work of International Political Economy scholar Susan Strange, this multidisciplinary volume features experts from political science, anthropology, law, criminology,...
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras
Intelligent Projects Using Python: 9 real-world AI projects leveraging machine learning and deep learning with TensorFlow and Keras

Implement machine learning and deep learning methodologies to build smart, cognitive AI projects using Python

Key Features

  • A go-to guide to help you master AI algorithms and concepts
  • 8 real-world projects tackling different challenges in healthcare, e-commerce, and...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy