Listing 1 - 9 of 9 |
Sort by
|
Choose an application
This concise book meets the market need for an accessible and up-to-date guide on understanding and managing cardiac anesthesia patients. It reflects the continual evolution of the very complex field of cardiac anesthesia. Organized into 10 sections, beginning chapters comprehensively examine the foundational concepts of cardiovascular function. The book then functions as a practical guide for clinical settings, including patient evaluation, operating room and anesthetic management, and postoperative care. Each chapter is authored by experienced cardiac anesthesiologists and many are supplemented by high quality, images, videos and tables. Written for the student, trainee, and junior cardiac anesthesiologist, Cardiac Anesthesia: The Basics of Evaluation and Management covers the core concepts needed to treat the cardiac surgery patient and to the skillset needed to succeed in this field.
Anesthesiology. --- Cardiology. --- Surgery. --- Surgery, Primitive --- Medicine --- Heart --- Internal medicine --- Anaesthesiology --- Surgery --- Diseases --- Anesthesia in cardiology. --- Cardiac anesthesia --- Cardiological anesthesia --- Cardiology
Choose an application
Choose an application
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .
Engineering. --- Computer security. --- Computers. --- Biometrics (Biology). --- System safety. --- Electrical engineering. --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Systems and Data Security. --- Security Science and Technology. --- Biometrics. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Telecommunication. --- Information systems. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Protection --- Security measures --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Electric engineering --- Engineering --- Statistical methods --- Prevention
Choose an application
This book constitutes the refereed proceedings of the First International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2017, held in Vancouver, BC, Canada, in October 2017. The 12 full papers presented together with 1 short paper were carefully reviewed and selected from 43 submissions. This book also contains 3 keynote talks and 2 tutorials. The contributions included in this proceedings cover many aspects of theory and application of effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems and infrastructures, such as botnet detection, secure cloud computing and cryptosystems, IoT security, sensor and social network security, behavioral systems and data science, and mobile computing.
Computer science. --- Computer communication systems. --- Software engineering. --- User interfaces (Computer systems). --- Personal computers. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- User Interfaces and Human Computer Interaction. --- Personal Computing. --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Interfaces, User (Computer systems) --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Minicomputers --- Human-machine systems --- Human-computer interaction --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Computer networks --- Cloud computing --- Computers --- Security measures --- Information Technology. --- Web services --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Choose an application
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .
Biomathematics. Biometry. Biostatistics --- Telecommunication technology --- Production management --- Mass communications --- Computer architecture. Operating systems --- Information systems --- ICT (informatie- en communicatietechnieken) --- biomathematica --- veiligheid (mensen) --- biostatistiek --- informatica --- informatiesystemen --- tekstverwerking --- biometrie --- computerbeveiliging --- communicatietechnologie
Choose an application
This book constitutes thoroughly reviewed and selected short papers presented at the 25th East-European Conference on Advances in Databases and Information Systems, ADBIS 2021, as well as papers presented at doctoral consortium and ADBIS 2021 workshops. Due to the COVID-19 the conference and satellite events were held in hybrid mode. The 11 full papers and 18 short papers were carefully reviewed and selected from 97 total submissions. This volume presents the papers that have been accepted for the following satellite events: Workshop on Intelligent Data - From Data to Knowledge, DOING 2021; International Symposium on Data-Driven Process Discovery and Analysis, SIMPDA 2021; Workshop on Modern Approaches in Data Engineering and Information System Design, MADEISD 2021; Workshop on Advances in Data Systems Management, Engineering, and Analytics, MegaData 2021; Workshop on Computational Aspects of Network Science, CAoNS 2021; Doctoral Consortium. .
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- datamining --- applicatiebeheer --- apps --- informatica --- database management --- KI (kunstmatige intelligentie) --- architectuur (informatica) --- data acquisition --- AI (artificiële intelligentie)
Choose an application
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- datamining --- applicatiebeheer --- apps --- informatica --- database management --- KI (kunstmatige intelligentie) --- architectuur (informatica) --- data acquisition
Choose an application
This volume constitutes short papers and DETECT 2022 workshop papers, presented during the 11th International Conference on Model and Data Engineering, MEDI 2022, held in Cairo, Egypt, in November 2022. The 11 short papers presented were selected from the total of 65 submissions. This volume also contains the 4 accepted papers from the DETECT 2022 workshop, held at MEDI 2022. The volume focuses on advances in data management and modelling, including topics such as data models, data processing, database theory, database systems technology, and advanced database applications.
Mathematical control systems --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- informatietechnologie --- wiskunde --- software engineering --- KI (kunstmatige intelligentie) --- architectuur (informatica) --- informatietheorie --- AI (artificiële intelligentie)
Listing 1 - 9 of 9 |
Sort by
|