This volume provides guidance and answers to frequently asked questions in infectious diseases, thus facilitating improved patient care, prudent and cost effective management and investigation of these disorders. Other more complicated but less common conditions are also reviewed. Uniquely, this volume directly discusses several controversies...
Neurocriminology: Forensic and Legal Applications, Public Policy Implications explores the dramatic impact of advances in neuroscience research and practice to our present understanding of criminality and crime control. Contemporary, cutting-edge research in neuroscience is cited and explained. Studies and cases are clearly...
This book is the third in a set of books that address the trading markets. We use the term “trading markets” because that is the most general term we can find for the portion of the financial markets sometimes imprecisely referred to as the securities markets. (We explained these distinctions in Book 1, An Introduction to Trading...
This book employs actor-network theory in order to examine how representations of crime are produced for contemporary prime-time television dramas. As a unique examination of the production of contemporary crime television dramas, particularly their writing process, Making Crime Television: Producing Entertaining Representations of...
Cut through the noise to understand how politics really works
Fake news. Twitter rants. Misinformation. Silos. Echo chambers. Spin. Alternative facts. Investigation, accusation, and obfuscation. Punditry, polls, and prognostication. This is today’s politics. To cut through the noise, students...
Whether you’re moving to .NET for the first time, or you’re already writing applications on .NET 2.0 or .NET 3.0, Pro VB 2008 and the .NET 3.5 Platform will provide you with a solid grounding in this new technology and serve as a comprehensive reference throughout your coding career:
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the...
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,...
Chest sonography is an established procedure in the stepwise imaging diagnosis of pulmonary and pleural disease. It is the method of choice to distinguish between solid and liquid lesions and allows the investigator to make an unequivocal diagnosis without exposing the patient to costly and stressful procedures. This book presents the state...
(Woodhead Publishing Limited) Provides an authoritative guide to they key issues in dealing with food intolerance within the food industry. Text explains key terminology and the mechanisms of food intolerance, key issues for those trying to minimize the amount of allergens in food, current labeling requirements and international sources of...
Decision support systems comprise a core subject area of the information systems
(IS) discipline, being one of several major expansions that have occurred in the IS
field. The decision support system (DSS) area, as a subject of research and
practice, continues to grow along ever-widening horizons – often blending with
other...