Search

Search Results

Results 1-10 of 36 (Search time: 0.175 seconds).
Item hits:
  • Book


  • Authors: John A. Kiernan (2013)

  • This classic well-illustrated textbook simplifies neuroscience content to focus coverage on the essentials and helps students learn important neuroanatomical facts and definitions. Among its many distinctions are its organization by region and then pathways into and out of the nervous system, which permits students an integrated view of the anatomy and physiology; level of treatment suited to increasingly shorter neuroanatomy course hours for medical and allied health students; and the author's succinct writing style.

  • Book


  • Authors: Stephen B Hulley (2013)

  • This book provides a practical guide to planning, tabulating, formulating, and implementing clinical research, in an easy-to-use, readable presentation"--Provided by publisher.

  • Sách/Book


  • Authors: Lourdes Ortega (2013)

  • The field of Second language acquisition (SLA, for short) investigates the human capacity to learn additional languages in late childhood, adolescence, or adulthood, after the first language --in the case of monolinguals-- or languages --in the case of bilinguals-- have already been acquired. Understanding Second Language Acquisition offers a wide-encompassing survey of this burgeoning field, its accumulated findings and proposed theories, its developed research paradigms, and its pending questions for the future. The book zooms in and out of universal, individual, and social forces, in each case evaluating the research findings that have been generated across diverse naturalistic and formal contexts for second language acquisition. It assumes no background in SLA and provides helpf...

  • Sách/Book


  • Authors: Dan C. Marinescu (2013)

  • Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms...

  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Upon completion of this material, you should be able to: List the key managerial roles and the main types of managerial positions in an organization. • Describe the POLC project management model. • List and describe organizational/structural approaches to information security. • Explain the difference between security policy, standard and procedure. • Enlist different types of security policy that can be found in an organization

  • Sách/Book


  • Authors: Szigeti, Tim (2013)

  • This authoritative guide to deploying, managing, and optimizing QoS with Cisco technologies has been thoroughly revamped to reflect the newest applications, best practices, hardware, software, and tools for modern networks. This new edition focuses on complex traffic mixes with increased usage of mobile devices, wireless network access, advanced communications, and video. It reflects the growing heterogeneity of video traffic, including passive streaming video, interactive video, and immersive videoconferences. It also addresses shifting bandwidth constraints and congestion points; improved hardware, software, and tools; and emerging QoS applications in network security

  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Define key terms and critical concepts of information security. • List the key challenges of information security, and key protection layers. • Describe the CNSS security model (McCumber Cube). • Be able to differentiate between threats and attacks to information. • Identify today's most common threats and attacks against information.

  • Sách/Book


  • Authors: Xiaohua Tian (2013)

  • Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today's greatly enhanced hardware capacity to good use in designing a scalable multicast protocol for supporting large-scale multimedia services. Linking new hardware to improved performance in the Internet's next incarnation is a research hot-spot in the computer communications field.