Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Credit and Community: Working-Class Debt in the UK since 1880
Credit and Community: Working-Class Debt in the UK since 1880
Credit's centrality to the current economic crisis makes the publication of Sean O'Connell's social history of working-class credit consumption particularly timely. Although the credit crunch came too late to be included in this book, the portrait of a complex relationship between lenders and borrowers over the past 120 years should be required...
Community-Built Databases: Research and Development
Community-Built Databases: Research and Development

Communities have built collections of information in a collaborative manner for centuries. Around 250 years ago, more than 140 people wrote l’Encyclopedie in 28 volumes with 70,000 articles. More recently, Wikipedia has demonstrated how collaborative efforts can be a powerful method of building a massive data storage. It is...

Kinematic Self-Replicating Machines
Kinematic Self-Replicating Machines
The principal goal of molecular nanotechnology (MNT) is to develop a manufacturing technology able to inexpensively manufacture most arrangements of atoms that are consistent with physical law. In terms of its precision, flexibility, and low cost, this will be the ultimate manufacturing technology in human history. Two central mechanisms have been...
Universal Mandelbrot Set: Beginning of the Story
Universal Mandelbrot Set: Beginning of the Story
This book is devoted to the structure of Mandelbrot set - a remarkable and important personage of the modern theoretical physics, related to chaos and fractals and simultaneously to analytical functions, Riemann surfaces and phase transitions. This makes Mandelbrot set one of the bridges connecting the worlds of chaos and order (integrability). At...
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)

Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and...

Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests
Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests

This book focuses on efficacy, toxicity, drug interactions, and abnormal clinical laboratory tests resulting from the use of herbal remedies. Although a few herbal remedies are safe and have efficacy (for example saw palmetto), many herbal remedies are toxic. This book guides in the interpretation of abnormal test results in otherwise healthy...

Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications
Computational Intelligence: Principles, Techniques and Applications presents both theories and applications of computational intelligence in a clear, precise and highly comprehensive style. The textbook addresses the fundamental aspects of fuzzy sets and logic, neural networks, evolutionary computing and belief networks. The...
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media provides a cutting-edge look at how entertainment media affects its viewers, both in intended and unintended ways, and the psychological processes that underlie these effects. The collection represents an international, multidisciplinary investigation of an age-old process--persuasion--in a relatively...
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
Allergy: An Atlas of Investigation and Diagnosis
Allergy: An Atlas of Investigation and Diagnosis

In one form or another, allergies and intolerances affect approximately one third of the population, with as many as half of all sufferers being children.

Demystifying the whole subject, this exciting new reference is designed with one purpose in mind - to help allergy specialists and general practitioners care for patients...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy