 |
|
 Criminal Investigative FailuresThis topic is vitally important for not only understanding the causes and prevention of failures, but for understanding and measuring success. —John Eck, University of Cincinnati, Department of Criminal Justice
For serious crimes, criminal investigators are the gatekeepers for the rest of the criminal... |  |  Adventures in the World of Matrices (Contemporary Mathematical Studies)The purpose of the book is to give the reader a feeling for the beauty and the surprises of mathematical research by building up step by step a theory of cycle matrices. The notions of matrix and cycle are presented for those readers who do not yet know the concepts. Then, starting and experimenting with cycle matrices of low dimensions and... |  |  Pro Silverlight 2 in VB 2008 (Expert's Voice in Web Development)Silverlight is a framework for building rich, browser-hosted applications that run on a variety of operating systems. Silverlight works its magic through a browser plug-in. When you surf to a web page that includes some Silverlight content, this browser plug-in runs, executes the code, and renders that content in a specifically designated region of... |
|
|
 Games And Simulations in Online Learning: Research And Development FrameworksNearly all early learning happens during play, and new technology has added video games to the list of ways children learn interaction and new concepts. Although video games are everywhere, on Web sites, in stores, streamed to the desktop, on television, they are absent from the classroom. Computer-based simulations, a form of computer games, have... |  |  Developing with Google App Engine (Firstpress)Developing with Google App Engine introduces development with Google App Engine, a platform that provides developers and users with infrastructure Google itself uses to develop and deploy massively scalable applications.
- Introduction to concepts
- Development with App Engine
- Deployment into App
... |  |  |
|
 Open Source E-mail Security (Kaleidoscope)In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping... |  |  Modelling Methods for Energy in BuildingsClimate change mitigation and sustainable practices are now at the top of political and technical agendas. Environmental system modelling provides a way of appraising options and this book will make a significant contribution to the uptake of such systems. It provides knowledge of the principles involved in modelling systems, builds confidence... |  |  Atoms, Radiation, and Radiation Protection (Physics Textbook)Since the preparation of the second edition (1995) of Atoms, Radiation, and Radiation Protection, many important developments have taken place that affect the profession of radiological health protection. The International Commission on Radiological Protection (ICRP) has issued new documents in a number of areas that are addressed in this third... |
|
| Result Page: 503 502 501 500 499 498 497 496 495 494 493 492 491 490 489 488 487 486 485 |