Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Controversies in Laparoscopic Surgery
Controversies in Laparoscopic Surgery
There are numerous textbooks detailing almost every aspect of the different laparoscopic procedures. However, in this era of evidence-based medicine, a text focusing on the controversies from the laparoscopic as well as the general surgeon's point of view is missing.

This book is not intended to be yet another textbook of laparoscopy;...

Synthetic Instruments: Concepts and Applications
Synthetic Instruments: Concepts and Applications
The way electronic measurement instruments are built is making an evolutionary leap to a new method of design called synthetic instruments. This promises to be the most significant advance in electronic test and instrumentation since the introduction of automated test equipment (ATE). The switch to synthetic instruments is beginning now, and it...
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Session Initiation Protocol (SIP): Controlling Convergent Networks (McGraw-Hill Communication Series)
Telephone networks have come a long ways in the last 100 years. Or have they? If one looks at how a telephone network works, not much has changed. Connections are still made through “dedicated” circuits connected end to end for the duration of a call. While switchboard operators have been replaced by digital switching systems, the...
Foundation Version Control for Web Developers (Foundations Apress)
Foundation Version Control for Web Developers (Foundations Apress)

Since you happen to be reading through the opening pages of Foundation Version Control for Web Developers then it’s safe to say you have some interest in finding out a little bit more about version control. It may be true that this new interest isn’t actually your own, but instead comes from a friend, colleague, or employer who...

Linux Security Cookbook
Linux Security Cookbook
f you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:

In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the...

High-performance Packet Switching Architectures
High-performance Packet Switching Architectures
Over the years, different architectures have been investigated for the design and implementation of high-performance switches. Particular architectures were determined by a number of factors based on performance, flexibility and available technology. Design differences were mainly a variation in the queuing functions and the switch core. The...
Beginning JavaScript Charts: With jqPlot, d3, and Highcharts (Expert's Voice in Web Development)
Beginning JavaScript Charts: With jqPlot, d3, and Highcharts (Expert's Voice in Web Development)

Beginning JavaScript Charts shows how to convert your data into eye-catching, innovative, animated, and highly interactive browser-based charts. This book is suitable for developers of all experience levels and needs: for those who love fast and effective solutions, you can use the jqPlot library to generate charts with...

Kotlin Standard Library Cookbook: Master the powerful Kotlin standard library through practical code examples
Kotlin Standard Library Cookbook: Master the powerful Kotlin standard library through practical code examples
Build optimized applications in Kotlin by learning how to make use of the standard library features the smart way.

Key Features
  • Get the most out of the Kotlin library to develop high-quality portable applications
  • Explore the powerful support for data processing and I/O...
Phobias (Diseases and Disorders)
Phobias (Diseases and Disorders)
Human beings have a love/hate relationship with fear. Medals are given to valiant warriors who charge fearlessly into combat, while those who sneak around whimpering in their battle helmets are labeled cowards and in some cultures are even put to death for what is considered a war-time crime. As a whole, people generally find fear to be...
Asterisk Gateway Interface 1.4 and 1.6 Programming
Asterisk Gateway Interface 1.4 and 1.6 Programming

Who this book is written for?

This book is intended for developers wishing to utilize Asterisk, system administrators wishing to gain better control over their Asterisk installation, and telephony service providers wishing to deploy Asterisk-based solutions to their infrastructure. You are expected to have some...

Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

Cisco Multiservice Switching Networks
Cisco Multiservice Switching Networks

A practical guide to understanding Cisco's multiservice switching architecture and designing and deploying MPLS and PNNI implementations

* Learn theory framework and configuration of MSS and design guidelines
* Includes a case study with MPLS and PNNI in all the platforms
* The only book regarding Multiservice Switching
...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy