Home | Amazing | Today | Tags | Publishers | Years | Search 
Drugs of Abuse: Body Fluid Testing (Forensic Science and Medicine)
Drugs of Abuse: Body Fluid Testing (Forensic Science and Medicine)

A comprehensive review of the science of drug testing in all its aspects, placing emphasis on technologies that use body fluids other than urine for determining the presence of drugs of abuse. The authors discuss the various body fluid specimens suitable for testing for illicit drugs-particularly saliva, sweat, and hair-describe the...

Smart Products, Smarter Services: Strategies for Embedded Control
Smart Products, Smarter Services: Strategies for Embedded Control

Billions of smart connected products are changing the competitive landscape for business and the daily lives of consumers. This book analyzes the evolution of embedded product intelligence and the impact of smart products on the automotive, wireless, energy, residential and health industries. It considers the transformation of consumer...

Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Advanced Location-Based Technologies and Services
Advanced Location-Based Technologies and Services

Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing...

Anonymizing Health Data: Case Studies and Methods to Get You Started
Anonymizing Health Data: Case Studies and Methods to Get You Started

Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...

Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)
Trustworthy Execution on Mobile Devices (SpringerBriefs in Computer Science)

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed...

Microsoft Word 2016 Step By Step
Microsoft Word 2016 Step By Step

The quick way to learn Microsoft Word 2016!This is learning made easy. Get more done quickly with Word 2016. Jump in wherever you need answers--brisk lessons and colorful screenshots show you exactly what to do, step by step.

  • Get easy-to-follow guidance from a certified Microsoft Office Specialist Master
  • ...
Introduction to Social Media Investigation: A Hands-on Approach
Introduction to Social Media Investigation: A Hands-on Approach

If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share...

SemProM: Foundations of Semantic Product Memories for the Internet of Things (Cognitive Technologies)
SemProM: Foundations of Semantic Product Memories for the Internet of Things (Cognitive Technologies)

The development of low-cost, compact digital storage, sensors and radio modules allows us to embed digital memories into products to record key events. Such computationally enhanced products can perceive and control their environment, analyze their observations, and communicate with other smart objects and human users. Digital product...

Windows 8.1 Inside Out
Windows 8.1 Inside Out

You're beyond the basics - so dive right in and really put your PC to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows 8.1. Plus, you get access to two and half hours of video training and a companion ebook.

Topics include:

New Perspectives on Computer Concepts 2014: Comprehensive
New Perspectives on Computer Concepts 2014: Comprehensive

Go beyond computing basics with the award-winning NEW PERSPECTIVES ON COMPUTER CONCEPTS. Designed to get you up-to-speed on essential computer literacy skills, this market leading text goes deeper, providing technical and practical information relevant to everyday life. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2014 incorporates significant...

FISMA Compliance Handbook: Second Edition
FISMA Compliance Handbook: Second Edition

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book...

Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy