Home | Amazing | Today | Tags | Publishers | Years | Search 
Phobias (Diseases and Disorders)
Phobias (Diseases and Disorders)
Human beings have a love/hate relationship with fear. Medals are given to valiant warriors who charge fearlessly into combat, while those who sneak around whimpering in their battle helmets are labeled cowards and in some cultures are even put to death for what is considered a war-time crime. As a whole, people generally find fear to be...
Real-Life X-Files: Investigating the Paranormal
Real-Life X-Files: Investigating the Paranormal
"Whoever said that the truth is both stranger and more entertaining than fiction describes this book exactly." -- Skeptical Inquirer

Interest in the paranormal is at an all-time high. Ghosts, UFOs, psychic power and other unexplained phenomena are endlessly fascinating for us. People often seem to accept of
...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Introduction to Residential Layout
Introduction to Residential Layout
Accessible guide to theory and practice of residential design.

Introduction to Residential Layout is ideal for students and practitioners of urban design, planning, engineering, architecture and landscape seeking a comprehensive guide to the theory and practice of designing and laying out residential areas.

Mike
...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Digital piracy. It's a global war -- and it's just begun. Pirates of the Digital Millennium chronicles that war. All of it: media conglomerates vs. teenagers, tech companies vs. content providers, artists battling artists, nations vs. nations, law enforcement vs. organized crime. John Gantz and Jack Rochester cover every side and all the...
Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Search and Seizure of Digital Evidence (Criminal Justice: Recent Scholarship)
Moore explains the difficulties in applying traditional Fourth Amendment jurisprudence several of the more common warrantless search doctrines, in order to determine what aspects of traditional search and seizure doctrine apply to crimes involving technology. To amplify his points, he discusses several high technology crimes. Additionally, he...
Grammar Snobs Are Great Big Meanies: A Guide to Language for Fun and Spite
Grammar Snobs Are Great Big Meanies: A Guide to Language for Fun and Spite
The antidote to Eats, Shoots and Leaves—an uproarious and very American language book for those who are tired of getting pulled over by the grammar police

What do suicidal pandas, doped-up rock stars, and a naked Pamela Anderson have in common? They’re all a heck of a lot more interesting than
...
Database Design for Smarties: Using UML for Data Modeling
Database Design for Smarties: Using UML for Data Modeling
If you want to see how your next database project can profit from object-oriented design, check out Database Design for Smarties, a lively and intelligent guide to using objects in databases.

The book begins with a tour of some underlying factors in modeling databases. Here, the author distinguishes between the external,...

CD and DVD Forensics
CD and DVD Forensics
CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has...
Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the...

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy