 |
|
 Phobias (Diseases and Disorders)Human beings have a love/hate relationship with fear. Medals are given to valiant warriors who charge fearlessly into combat, while those who sneak around whimpering in their battle helmets are labeled cowards and in some cultures are even put to death for what is considered a war-time crime. As a whole, people generally find fear to be... |  |  Real-Life X-Files: Investigating the Paranormal"Whoever said that the truth is both stranger and more entertaining than fiction describes this book exactly." -- Skeptical Inquirer
Interest in the paranormal is at an all-time high. Ghosts, UFOs, psychic power and other unexplained phenomena are endlessly fascinating for us. People often seem to accept of... |  |  Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... |
|
 Introduction to Residential LayoutAccessible guide to theory and practice of residential design.
Introduction to Residential Layout is ideal for students and practitioners of urban design, planning, engineering, architecture and landscape seeking a comprehensive guide to the theory and practice of designing and laying out residential areas.
Mike... |  |  Blown to Bits: Your Life, Liberty, and Happiness After the Digital ExplosionEvery day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,... |  |  |
|
|
 CD and DVD ForensicsCD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has... |  |  Computer Viruses and Malware (Advances in Information Security)Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the... |  |  Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 |