|
|
|
|
|
Drawing the Line: Art Therapy with the Difficult ClientThis resourceful guide presents art therapy techniques for difficult clients where the typical therapist-client interaction can often be distant, demanding, and frustrating. Offering practical and theoretical information from a wide variety of treatment populations and diagnostic categories; and incorporating individual, group, and family therapy... | | Aspects of Explosives DetectionDetection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the... | | |
|
|
Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop... | | Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who... | | Software & Systems Requirements Engineering: In PracticeProven Software & Systems Requirements Engineering Techniques
"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 |