 |
|
 Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry)This book sets out to provide a description of the chemical analysis of potentially contaminated land for all those involved in risk assessment. It is not intended as a recipe book of analytical methods. Indeed, with the wide range of techniques and options available, it would be impracticable and unnecessary to document all potential methods, and... |  |  Better Location Shooting: Techniques for Video Production"If you are a shooter, you got to read this book." --Internet Video Magazine
Take your job on the road and film on location!
Location filming is growing in popularity with the abundance of affordable cameras. You don't need a studio, a broadcast truck, or even extensive... |  |  |
|
 The Use of Forensic Anthropology, Second EditionThis book is written for medical examiners, coroners, and other law enforcement officers who are responsible for conducting death investigations. Forensic analysis has become and will continue to be a complex and highly specialized field of study. No longer can the lone investigator take on the responsibilities of doing all the work of recovery,... |  |  Advertising Photography: A Straightforward Guide to a Complex IndustryIf you are an aspiring or professional photographer looking to break into advertising, "Advertising Photography: A Straightforward Guide to a Complex Industry" will provide you with an honest and uncensored look at this highly competitive and lucrative business. While working in the advertising photography industry can be glamorous and... |  |  Net Neutrality or Net Neutering: Should Broadband Internet Services Be RegulatedMost of the papers in this book were originally presented at a June 2003 Progress & Freedom Foundation conference entitled, "Net Neutrality or Net Neutering: Should Broadband Internet Services Be Regulated." As we now publish the suitably updated collection of papers, along with two others, the title remains entirely appropriate. For... |
|
|
 |  |  Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |  |  Going to Extremes: How Like Minds Unite and DivideWhy do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?
In... |
|
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 |