Home | Amazing | Today | Tags | Publishers | Years | Search 
Herbal Products: Toxicology and Clinical Pharmacology (Forensic Science and Medicine)
Herbal Products: Toxicology and Clinical Pharmacology (Forensic Science and Medicine)

Herbal Products: Toxicology and Clinical Pharmacology, Second Edition builds on the informative foundation laid by its predecessor. This fully revised and expanded second edition boasts more than 200 new references that document efficacy studies and adverse effects and four new chapters devoted to dietary products. Practitioners and...

Drugs of Abuse: Body Fluid Testing (Forensic Science and Medicine)
Drugs of Abuse: Body Fluid Testing (Forensic Science and Medicine)

A comprehensive review of the science of drug testing in all its aspects, placing emphasis on technologies that use body fluids other than urine for determining the presence of drugs of abuse. The authors discuss the various body fluid specimens suitable for testing for illicit drugs-particularly saliva, sweat, and hair-describe the...

Schizophrenia: A New Guide for Clinicians (Medical Psychiatry Series)
Schizophrenia: A New Guide for Clinicians (Medical Psychiatry Series)

Contains guidelines and recommendations-in tabular form for quick reference-on patient evaluation and optimal treatment for long-term care!

Based on evidence from recent systematic clinical research studies, this comprehensive reference provides the latest information on the assessment, diagnosis, and treatment of
...

Guide to Neuropsychiatric Therapeutics
Guide to Neuropsychiatric Therapeutics

Written primarily by Fellows of the American Neuropsychiatric Association, this handbook offers practical, explicit, evidence-based guidelines for diagnosis and treatment of neuropsychiatric disorders. Concise, clinically oriented chapters cover all psychiatric and behavioral disorders associated with brain dysfunction. Each chapter...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Biological Anthropology of the Human Skeleton
Biological Anthropology of the Human Skeleton

An Indispensable Resource on Advanced Methods of Analysis of Human Skeletal and Dental Remains in Archaeological and Forensic Contexts

Now in its third edition, Biological Anthropology of the Human Skeleton has become a key reference for bioarchaeologists, human osteologists, and paleopathologists...

And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy