 |
|
|
|
 Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant,
or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological
organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms,
such as animals,... |  |  |  |  The Syrian Social Nationalist Party: Its Ideology and History
The emergence of the Syrian Social Nationalist Party (SSNP) during the Syrian civil war as a military and political force has elicited interest and debate among observers and analysts of the Middle East. Long considered as irrevocably marginalized by decades of prohibition and persecution, the SSNP has over the last decade re-asserted itself as... |
|
|
 Information Warfare and Organizational Decision-MakingOrganizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because... |  |  |  |  |
|
 Handbook of Database Security: Applications and TrendsDatabase security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of... |  |  Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |  |  Cryptography: A Very Short IntroductionWe are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight... |
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 |