|
|
Neuroethics: Challenges for the 21st Century
In the late 1960s, a new field of philosophical and moral enquiry
came into existence. Bioethics, as it soon came to be called, quickly
mushroomed: it developed its own journals, its own professional
associations, its own conferences, degree programs and experts.
It developed very rapidly for many reasons, but no doubt the main... | | Natural Cures "They" Don't Want You To Know AboutKevin Trudeau blows the lid off a nest of deception and double standards concerning general and individual health in this new book, "Natural Cures 'They' Don't Want You To Know About." Kevin has risked government prosecution to bring you the full story of an intricate conspiracy.
From the retail supermarket outlets of huge, publicly... | | Great Feuds in Mathematics: Ten of the Liveliest Disputes EverMathematical disputes offer indisputable proof that great mathematical minds are calculating in more ways than one. Fueled by greed, jealousy, ambition, and ego, they have plots worthy of a soap opera, pitting brother against brother, father against son, and student against mentor.
In the sixteenth century, Cardano and Tartaglia battled... |
|
The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy
Information is a two edged sword that can both help and hinder modern society. The Art of Information Warfare is the first common-sense primer on the subject written for those interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and... | | Psychology and Law: Truthfulness, Accuracy and Credibility
How can psychology inform law and policing to help determine the accuracy of witnesses, victims and suspects?
This second edition of Psychology and Law: Truthfulness, Accuracy and Credibility is a substantially revised and exhaustive review of forensic research to do with credibility and the accuracy of evidence.
... | | Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |
|
|
The Art of Investigative Interviewing, Third Edition
The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative interviewing, such as human psychology, proper interview preparation,... | | The Amber Room: A NovelThe Amber Room is one of the greatest treasures ever made by man: an entire room forged of exquisite amber, from its four massive walls to its finely crafted furniture. But it is also the subject of one of history’s most intriguing mysteries. Originally commissioned in 1701 by Frederick I of Prussia, the Room was later perfected Tsarskoe... | | Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|
|
Result Page: 3 2 1 |