 |
|
 Ecological Connectivity among Tropical Coastal EcosystemsMangrove forests, seagrass beds, and coral reefs are circumtropical ecosystems that are highly productive, and provide many important biological functions and economic services. These ecosystems cover large surface areas in the shallow tropical coastal seascape but have suffered from serious human degradation, especially in the last few decades.... |  |  For Crying Out Loud: From Open Outcry to the Electronic ScreenIn Praise of For Crying Out Loud
"Endowed with strong parents and a bit of luck, Leo Melamed has made a remarkable escape from Nazi occupied Poland to building one of the pinnacles of global finance. Over four decades and more, he was the leading force in bringing his beloved 'Merc' from obscure trading pits for butter... |  |  Why Does E=mc2?: (And Why Should We Care?)
The most accessible, entertaining, and enlightening explanation of the best-known physics equation in the world, as rendered by two of today’s leading scientists.
Professor Brian Cox and Professor Jeff Forshaw go on a journey to the frontier of 21st century science to consider the real meaning behind the iconic sequence of... |
|
|
 Developing Large Web Applications: Producing Code That Can Grow and Thrive
How do you create a mission-critical site that provides exceptional performance while remaining flexible, adaptable, and reliable 24/7? Written by the manager of a UI group at Yahoo!, Developing Large Web Applications offers practical steps for building rock-solid applications that remain effective even as you add features,... |  |  Social Computing: Concepts, Methodologies, Tools, and Applications
Social Computing: Concepts, Methodologies, Tools, and Applications uncovers the growing and expanding phenomenon of human behavior, social constructs, and communication in online environments. This multiple volume publication presents the latest research on social change, evolving networks, media, and interaction with technology to offer... |  |  Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will... |
|
|
| Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |