Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Three Laws of Nature: A Little Book on Thermodynamics
Three Laws of Nature: A Little Book on Thermodynamics
A short and entertaining introduction to thermodynamics that uses real-world examples to explain accessibly an important but subtle scientific theory
 
A romantic description of the second law of thermodynamics is that the universe becomes increasingly disordered. But what does that actually mean? Starting with
...
The Electronic Communications Code and Property Law: Practice and Procedure
The Electronic Communications Code and Property Law: Practice and Procedure

Life now without access to electronic telecommunications would be regarded as highly unsatisfactory by most of the UK population. Such ready access would not have been achieved without methodical and ultimately enforceable means of access to the land on which to install the infrastructure necessary to support the development of an...

File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
Killer Game Programming in Java
Killer Game Programming in Java

Although the number of commercial Java games is still small compared to those written in C or C++, the market is expanding rapidly. Recent updates to Java make it faster and easier to create powerful gaming applications-particularly Java 3D-is fueling an explosive growth in Java games. Java games like Puzzle Pirates, Chrome,...

Chinese Business Law (The Palgrave Series on Chinese Law)
Chinese Business Law (The Palgrave Series on Chinese Law)
This book offers the first definitive English-language resource on Chinese business law. Written by an authoritative source, the book accurately describes what the business law is and explains legislative intentions underlying the myriad of law, rules, and regulations. Moreover, it provides the most up-to-date information on law, rules, and...
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Illiberal Liberal States
Illiberal Liberal States

Understanding the dynamics of the illiberal practices of liberal states is increasingly important in Europe today. This book examines the changing relationship and interaction between immigration, citizenship and integration at the European and national arenas. It studies some of the main effects and open questions as regards the...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

unlimited object storage image
Result Page: 61 60 59 58 57 56 55 54 53 52 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy