Murach's C++ 2008 (Murach: Training & Reference)
Finally, a great training and reference book for Visual C++ by Dr. Prentiss Knowlton, an instructor of C++ since its inception. This book helps you master C++ 2008 quickly and easily by using all the time- and work-saving features of Visual Studio. That's true whether you're a:
Java developer who wants to learn...
Brain Damage and Repair: From Molecular Research to Clinical Therapy
This book builds a novel bridge from molecular research to clinical therapy. This approach reveals the functional features of neurons and glia in the particular context of vulnerability and self-protection, intracellular properties and extracellular matrix. Arising from this platform, this volume unfolds the molecular and systemic processes...
Nervous States: Democracy and the Decline of Reason
In this age of intense political conflict, we sense objective fact is growing less important. Experts are attacked as partisan, statistics and scientific findings are decried as propaganda, and public debate devolves into personal assaults. How did we get here, and what can we do about it?
Pheromones and Animal Behavior: Chemical Signals and Signatures
Pheromones and other kinds of chemical communication underlie the behavior of all animals. Building on the strengths of the first edition, widely recognized as the leading text in the subject, this is a comprehensive overview of how pheromones work. Extensively revised and expanded to cover advances made over the last ten years, the book...
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Learn how mobile devices are monitored and the impact of cloud computing...
Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...
|Result Page: 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 |