 |
|
 |  |  Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |  |  TcL Scripting for Cisco IOS (Networking Technology)
A guide to building and modifying Tcl scripts to automate network administration tasks
Streamline Cisco network administration and save time with Tcl scripting
Cisco networking professionals are under relentless pressure to... |
|
 Web Page Recommendation Models: Theory and Algorithms (Synthesis Lectures on Data Management)
One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services.... |  |  |  |  Food Chemical Risk Analysis (Food Science & Safety Series)
The recognition that chemicals in food, whatever their origin, might
present a risk to the consumer has long been recognised. However, early
food regulations at the beginning of the century were primarily aimed at
prevention of adulteration and fraud rather than directed at consumer
safety. It is only in the second half of the century... |
|
|
 |  |  Nutrition and Metabolism: Underlying Mechanisms and Clinical Consequences"Nutrition and Metabolism: Underlying Mechanisms and Clinical Consequences" brings together internationally recognized experts to comprehensively review our current understanding of how nutrition interacts with the genetic substrate as well as environmental-exogenous factors, including physical activity or the lack thereof, to result in... |  |  |
|
Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 |