Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Food Supply Chain Management
Food Supply Chain Management
Food is always a matter of interest, a means of providing energy, the raw material that builds and maintains our well-being, a defence against illness, a pleasure to consume when well prepared and presented, a basis for social interaction and enjoyment at home, in a restaurant, canteen or perhaps even hospital or school. Our...
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
Sexual Murder: Catathymic and Compulsive Homicide
Sexual Murder: Catathymic and Compulsive Homicide
During graduate school, I had planned on a career in professional psychology with an emphasis on evaluating and treating children and adolescents. After a 2-year traineeship at a state hospital, I was ready to begin my clinical internship at the New Jersey Neuropsychiatric Institute in Princeton. Due to an administrative snafu, however, I was...
Managing Intellectual Assets in the Digital Age
Managing Intellectual Assets in the Digital Age
This book examines challenges and opportunities associated with the development, distribution, and use of intellectual property and knowledge assets. For purposes of this book, intellectual property consists of the creative works that are governed by the principles of traditional intellectual property law: copyrights, patents, and trademarks....
Secure Messaging with Microsoft Exchange Server 2000
Secure Messaging with Microsoft Exchange Server 2000

Computer security was once thought to be the exclusive province of somber men in dark suits and nerdy, whey-faced hackers. While both of these archetypes are still well-represented in the computing industry, the last two years have witnessed an explosive growth in the number of organizations that are seeking to boost the...

Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have
...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)
The Sexual Economy of War: Discipline and Desire in the U.S. Army (Battlegrounds: Cornell Studies in Military History)

In The Sexual Economy of War, Andrew Byers argues that in the early twentieth century, concerns about unregulated sexuality affected every aspect of how the US Army conducted military operations. Far from being an exercise marginal to the institution and its scope of operations, governing sexuality was, in fact, integral to...

Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence

In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were...

The Execution of Willie Francis: Race, Murder, and the Search for Justice in the American South
The Execution of Willie Francis: Race, Murder, and the Search for Justice in the American South
On May 3, 1946, in St. Martinsville, Louisiana, a seventeen-year-old black boy was scheduled for execution by electric chair. Willie Francis had been charged with murder; his trial had been brief; his death sentence never in doubt. When the executioners flipped the switch, Willie screamed and writhed as electricity coursed through his body....
Complete Executor's Guidebook
Complete Executor's Guidebook

A step-by-step guide to settling a loved one?s estate.Being an executor or personal representative is no easy task. For many, the job comes at a time of high emotion and is something that has never been done before. The Complete Executor's Guidebook is here to help ease this troubling time and make this overwhelming task manageable. It...

Databases for Small Business: Essentials of Database Management, Data Analysis, and Staff Training for Entrepreneurs and Professionals
Databases for Small Business: Essentials of Database Management, Data Analysis, and Staff Training for Entrepreneurs and Professionals

This book covers the practical aspects of database design, data cleansing, data analysis, and data protection, among others. The focus is on what you really need to know to create the right database for your small business and to leverage it most effectively to spur growth and revenue.

Databases for Small Business...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy