 |
|
|
|
 Web2Py Manual
I am guilty! After publicly complaining about the existence of too many Python based web frameworks, after praising the merits of Django, Pylons, TurboGears, CherryPy, and web.py, after having used them professionally and taught them in University level courses, I could not resist and created one more: web2py.
Why did I commit such... |  |  Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... |  |  Serial Killer Investigations
In 1977, FBI Special Agent Robert Ressler first used the term ‘serial killer’ after a visit to Bramshill Police Academy, near London, where someone referred to a ‘serial burglar’. The inspired coinage was soon in general use to describe killers such as necrophile Ed Kemper (ten victims), schizophrenic Herb Mullin (14),... |
|
 Critical Survey of Mystery and Detective Fiction
This is a comprehensive survey of mystery and detective fiction that covers more than 390 writers and includes overviews on more than three dozen aspects of the genre.Continuing the Salem Press tradition of "Critical Survey" series, "Critical Survey of Mystery and Detective Fiction, Revised Edition" provides detailed... |  |  The Gale Encyclopedia of Children's Health: Infancy Through Adolescence
The safety of children is potentially at risk from accidents and injuries, as well as crime. Providing a safe environment, putting prevention measures into practice, and teaching children methods of self-protection are all ways to reduce the potential for harm to children.
Description
Accidents are the leading cause of... |  |  Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |