Home | Amazing | Today | Tags | Publishers | Years | Search 
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins

As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...

Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)
Criminal Poisoning: Investigational Guide for Law Enforcement, Toxicologists, Forensic Scientists, and Attorneys (Forensic Science and Medicine)

In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...

Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective
Assessment of Feigned Cognitive Impairment: A Neuropsychological Perspective

Comprehensive and user friendly, this book synthesizes the growing literature on symptom feigning in cognitive testing and translates it into evidence-based recommendations for clinical and forensic practice. A wide range of cognitive effort assessment techniques and strategies are critically...

Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

Robert B. Parker's Kickback (Spenser)
Robert B. Parker's Kickback (Spenser)

PI Spenser, knight-errant of the Back Bay, returns in this stellar New York Times–bestselling addition to the iconic series from author Ace Atkins.
 
What started out as a joke landed seventeen-year-old Dillon Yates in a lockdown juvenile facility in Boston Harbor. When he set up a prank Twitter
...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Restoring Justice, Fifth Edition: An Introduction to Restorative Justice
Restoring Justice, Fifth Edition: An Introduction to Restorative Justice

Restoring Justice: An Introduction to Restorative Justice, Fifth Edition, offers a clear and convincing explanation of restorative justice, a movement within criminal justice with growing worldwide influence. It explores the broad appeal of this new vision and offers a brief history of its development. The book presents a theoretical...

Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World

Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and eminently user-friendly overview of...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy