 |
|
 Asthma: The Biography (Biographies of Diseases)
Asthma is a familiar and growing disease today, but its story goes back to the ancient world, as we know from accounts in ancient texts from China, India, Greece and Rome. It was treated with acupuncture and Ayurveda.
As Western medicine developed, the nature of asthma became clearer, and its basis in the lungs recognized.... |  |  The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy
Information is a two edged sword that can both help and hinder modern society. The Art of Information Warfare is the first common-sense primer on the subject written for those interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and... |  |  Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... |
|
 SQL Antipatterns: Avoiding the Pitfalls of Database Programming
Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the anti?patterns in terms of logical database design, physical database design, queries, and application development.
The chances are good that your application's database... |  |  Mastering Joomla! 1.5 Extension and Framework Development
Joomla! is one of the world's top open source content management systems, which enables you to build websites and powerful online applications. Out of the box, Joomla! does a great job of managing the content needed to enhance the functionality of your website. But for many people, the true power of Joomla! lies in its application... |  |  Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |
|
 Free Yourself From Anxiety: A self-help guide to overcoming anxiety disorders
Anxiety disorders can rob you of independence, happiness and self-esteem. This book will enable you to free yourself from the crippling effects of anxiety and to go on to a happier and more fulfilled life. The authors describe simple self-help techniques and practical tips derived from years of helping people with anxiety problems. This book... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |  |  More Blood, More Sweat and Another Cup of Tea
The sequel to the bestselling memoir Blood, Sweat & Tea. Tom Reynolds is an ambulance worker. On any given day he can be attacked by strangers, sworn at by motorists, puked on, covered in blood and other much more unpleasant substances. He could help to deliver a baby in the morning and witness the last moments of a dying man in the... |
|
 Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... |  |  The Design of Rijndael: AES - The Advanced Encryption Standard
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents... |  |  Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... |
|
| Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |