Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Synthesis of Time: Zakat, Islamic Micro-finance and the Question of the Future in 21st-Century Indonesia
A Synthesis of Time: Zakat, Islamic Micro-finance and the Question of the Future in 21st-Century Indonesia

This book is an anthropological investigation into the different forms the economy assumes, and the different purposes it serves, when conceived from the perspective of Islamic micro-finance as a field of everyday practice. It is based on long-term ethnographic research in Java, Indonesia, with Islamic foundations active in managing...

Electromagnetic Fields in Mechatronics, Electrical And Electronic Engineering: Proceedings of Isef'05
Electromagnetic Fields in Mechatronics, Electrical And Electronic Engineering: Proceedings of Isef'05
This book contains the papers presented at the International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering ISEF’05 which was held in Baiona, Spain on September 15–17, 2005. ISEF conferences have been organized since 1985 as a common initiative of Polish and European...
Wireless Sensor Networks: Signal Processing and Communications
Wireless Sensor Networks: Signal Processing and Communications

A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring,...

Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response
Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring...

Manuscript Verse Collectors and the Politics of Anti-Courtly Love Poetry
Manuscript Verse Collectors and the Politics of Anti-Courtly Love Poetry
This book reappraises the work of early-seventeenth-century collectors of English Renaissance poetry in manuscript. The verse miscellanies, or poetry anthologies, of these collectors have long attracted the attention of literary editors looking for texts by individual, major authors, and they have more recently interested historians for their poems...
Why Does E=mc2?: (And Why Should We Care?)
Why Does E=mc2?: (And Why Should We Care?)

The most accessible, entertaining, and enlightening explanation of the best-known physics equation in the world, as rendered by two of today’s leading scientists.

Professor Brian Cox and Professor Jeff Forshaw go on a journey to the frontier of 21st century science to consider the real meaning behind the iconic sequence of...

We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
We Want to Negotiate: The Secret World of Kidnapping, Hostages and Ransom
"A wise and thorough investigation." - Lawrence Wright, author of The Looming Tower and The Terror Years

Starting in late 2012, Westerners working in Syria -- journalists and aid workers -- began disappearing without a trace. A year later the world learned they had been taken hostage by the
...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Cold Regions Engineering 2012
Cold Regions Engineering 2012

Proceedings of the 15th International Specialty Conference on Cold Regions Engineering, held in Quebec City, Canada, August 19-22, 2012. This collection contains 82 peer-reviewed papers on new developments in cold regions engineering and technologies. These papers offer a truly international view of the current state of knowledge in different...

Chemistry and Technology of Emulsion Polymerisation
Chemistry and Technology of Emulsion Polymerisation

Chemistry and Technology of Emulsion Polymerisation 2e provides a practical and intuitive explanation of emulsion polymerization, in combination with both conventional and controlled radical polymerization. For those working in industry,  coupling theory with everyday practice can be difficult. By carefully explaining the...

VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
An unbiased, neutral, fact-based investigation that simply allows the science to do the talking on childhood vaccinations. Written by father and son investigative journalism/research team Lance & James Morcan, with a foreword by medical laboratory scientist Elísabet Norris, VACCINE SCIENCE REVISITED is possibly the most...
Computer Forensics JumpStart
Computer Forensics JumpStart

Launch Your Career in Computer Forensics—Quickly and Effectively

Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field:

  • Conducting a computer forensics investigation
  • ...
unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy