|
|
|
|
|
Roitt's Essential Immunology, Tenth Edition (Essentials)
Roitt's Essential Immunology has established itself as the book of choice for students of immunology worldwide. This excellent textbook is commonly regarded as 'the best of the immunology primers' and the tenth edition remains at the cutting edge of this fascinating area of science.
The trademark of this book is... | | Gold Mining and the Discourses of Corporate Social Responsibility in Ghana
This book critically examines the practice and meanings of corporate social responsibility (CSR) and how the movement has facilitated a positive and somewhat unquestioned image of the global corporation. Drawing on extensive fieldwork material collected in Ghanaian communities located around the project sites of Newmont Mining... | | Hardening Windows, Second EditionHardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet... |
|
|
Compared to What?: An Introduction to the Anaylsis of Algorithms
I am very pleased to have this new book in the Aho/Ullman series Principles of Computer Science. I see this book as a major step toward making computer science theory accessible to the wide range of students who need to know the subject. It covers a good segment of the classical material on data structures and algorithms, but it does so in a... | | Character Development in Blender 2.5
I got started in Blender approximately eight and a half years ago. At the time,
there were very few tutorials or other training resources available. Essentially, the
only resource around was the people of the Blender Community, who was active
through the online forum, http://blenderartists.org. With nothing but the generous
time of... | | Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... |
|
|
Result Page: 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 |