"The book examines each program, offers various solutions and case studies for each disposal problem, and provides additional sources of information for each program for further reading or consultation."- The Hazardous Waste Consultant.
This book discusses the current and potential treatment technologies involved in...
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised:...
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...
Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.
The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...
Secure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features...
Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
This controversial bookmaintains that in Colombia the US has long supported a pervasive campaign of state violence directed against both armed insurgents and a wide range of unarmed progressive social forces. While the context may change from one decade to the next, the basic policies remain the same: maintain the pro-US Colombian...
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues...
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and...
"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...
One has only to read a newspaper or magazine to realize the importance of
energy at this early juncture of the 21st century. It will surely become more
critical as world demand for oil continues to increase and its supply peaks
and begins to fall.
Industrialized nations have become addicted to an ever-increasing...