|
|
|
|
Business Law: The Ethical, Global, and E-Commerce Environment
This is the 17th UCC Edition (and the twenty-second overall edition) of a business law text that first appeared in 1935. Throughout its 80 years of existence, this book has been a leader and an innovator in the fields of business law and the legal environment of business. One reason for the book’s success is its clear and comprehensive... | | Expanding Horizons in Bioethics
Like its predecessor, New Dimensions in Bioethics, this volume developed out of a series of lectures at Yale University’s Institution for Social and Policy Studies. Each speaker in the Bioethics & Public Policy Seminar Series was invited because of her or his expertise in a given area of bioethics. Each of the more successful... | | Narrating Narcos: Culiacán and Medellín (Pitt Illuminations)
Narrating Narcos presents a probing examination of the prominent role of narcotics trafficking in contemporary Latin American cultural production. In her study, Gabriela Polit Dueñas juxtaposes two infamous narco regions, Culiacán, Mexico, and Medellín, Colombia, to demonstrate the powerful forces of violence, ... |
|
|
|
Mobile Telemedicine: A Computing and Networking PerspectiveWireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has... | | Microwave Transmission Networks, Second Edition
It has been six years since the first edition of this book was prepared and published, during which time it was very well received among engineers, project managers, and everyone else interested in learning more about the terrestrial point-to-point microwave systems.
During that period of time there have been a number of new... | | Hiding in Plain Sight: Steganography and the Art of Covert CommunicationYour hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |