Home | Amazing | Today | Tags | Publishers | Years | Search 
Current Pediatric Therapy (Current Therapy)
Current Pediatric Therapy (Current Therapy)
Generations of practitioners have turned to this reference for the most recent advances in therapeutic care - including medical and surgical therapies, preventive medicine, adolescent gynecology, and behavioral issues. Now, CURRENT PEDIATRIC THERAPY is more of a bargain than ever before! The 18th Edition includes access to a web site for convenient...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

Practical Antenna Handbook
Practical Antenna Handbook
The Antenna Builder’s Bible – Updated and Better Than Ever!

Design and construct your own antennas with step-by-step instructions and plans. Joseph J. Carr’s Practical Antenna Handbook, Fourth Edition, is an update of the most popular book on antennas ever written. This empowering guide blends theoretical concepts that...

Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
"In recent years, comprehensive texts have been written for several of the other major areas of Artificial Intelligence, including machine learning, natural-language processing, and constraint-satisfaction processing, but until now, the field of planning has been devoid of such a resource, despite the considerable number of advances in and the...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Auto Repair For Dummies
Auto Repair For Dummies
Most of us don’t know the first thing about the machines we’re licensed to drive – and this can turn a ticket to freedom into a ticket to trouble. If you’re like most people, you probably tend to drive around until something goes wrong with the car. You then incur the expense of replacing worn and burnt-out parts (or...
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
High-Altitude Platforms for Wireless Communications
High-Altitude Platforms for Wireless Communications

Provides an introduction to High-Altitude Platform Stations (HAPS) technology and its applications for wireless communications

High-altitude platform stations offer a promising new technology that combines the benefits of terrestrial and satellite communication systems for delivering broadband...

Earthbag Building: The Tools, Tricks and Techniques (Natural Building Series)
Earthbag Building: The Tools, Tricks and Techniques (Natural Building Series)
Over 70 percent of Americans cannot afford to own a code-enforced, contractor-built home. This has led to widespread interest in using natural materials-straw, cob, and earth-for building homes and other buildings that are inexpensive, and that rely largely on labor rather than expensive and often environmentally-damaging outsourced materials....
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy