Home | Amazing | Today | Tags | Publishers | Years | Search 
City of Dust: Illness, Arrogance, and 9/11
City of Dust: Illness, Arrogance, and 9/11

The World Trade Center’s destruction unleashed one of the gravest environmental catastrophes in U.S. history. Now, former NY Times Ground Zero reporter Anthony DePalma presents a full accounting of the disaster that followed 9/11. He separates myths from reality…reveals decisions that destroyed...

The Gale Encyclopedia of Medicine
The Gale Encyclopedia of Medicine

The Gale Encyclopedia of Medicine 2 (GEM2) is a one-stop source for medical information on nearly 1,700 common medical disorders, conditions, tests, and treatments, including high-profile diseases such as AIDS, Alzheimer’s disease, cancer, and heart attack. This encyclopedia avoids medical jargon and uses language that laypersons can...

Confessions of a Public Speaker
Confessions of a Public Speaker

"At 7:48 a.m. on a Tuesday, I am showered, cleaned, shaved, pruned, fed, and deodorized, wearing a pressed shirt and shiny shoes, in a cab on my way to the San Francisco waterfront I'm far from home, going to an unfamiliar place, and performing for strangers, three stressful facts that mean anything can happen "

...

American Medical Association Guide to Preventing and Treating Heart Disease
American Medical Association Guide to Preventing and Treating Heart Disease

More Than 3 Million American Medical Association Books Sold.

American's most trusted medical authority shows you how to prevent and treat heart disease.

When you or someone you love is diagnosed with cardiovascular disease, it's important to know the facts, which can help save a life. In the American
...

Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...

Beginning C++ Through Game Programming, Third Edition
Beginning C++ Through Game Programming, Third Edition

Cutting-edge computer games rival the best that Hollywood has to offer in visual effects, musical score, and pure adrenaline rush. But games are a form of entertainment unlike any other; they can keep players glued to their monitors for hours on end. What sets games apart and makes them so engrossing is interactivity. In a computer game, you...

Beginning ASP.NET Security (Wrox Programmer to Programmer)
Beginning ASP.NET Security (Wrox Programmer to Programmer)

Programmers: protect and defend your Web apps against attack!

You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)

With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200...

Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence

In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were...

Chess Openings For Dummies (For Dummies (Sports & Hobbies))
Chess Openings For Dummies (For Dummies (Sports & Hobbies))

Improve your chess game the fast and easy way

You never get a second chance to make a first impression?especially in the game of chess! Chess Openings For Dummies gives you tips and techniques for analyzing openings and strategies for winning chess games from the very first move you make!

This friendly,...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy