Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Always Use Protection: A Teen's Guide to Safe Computing
Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do...
High-Rise Security and Fire Life Safety
High-Rise Security and Fire Life Safety
Due to their design and construction, high-rise buildings are unique structures with specialized needs. To protect the lives and property of the multitudes of people who daily use these facilities, it is essential that high-rise security and fire life safety programs be well planned and executed. Useful reference materials for commercial real...
ESD Basics: From Semiconductor Manufacturing to Product Use
ESD Basics: From Semiconductor Manufacturing to Product Use

Electrostatic discharge (ESD) continues to impact semiconductor manufacturing, semiconductor components and systems, as technologies scale from micro- to nano electronics. This book introduces the fundamentals of ESD, electrical overstress (EOS), electromagnetic interference (EMI), electromagnetic compatibility (EMC), and latchup, as well as...

Soil: The Skin of the Planet Earth
Soil: The Skin of the Planet Earth

The main focus of this monograph is to explain the important role of soil and the environment to a broad audience. Soil is one of the five essential factors crucial for human life. On the one hand the authors describe a responsible approach and use of soil, established on a basic knowledge of the nature of soil and the countless ongoing...

A+ Certification Study Guide, Fifth Edition (Certification Press)
A+ Certification Study Guide, Fifth Edition (Certification Press)
Get the book that shows you not only what--but how--to study
  • 100% complete coverage of all official objectives for the A+ Core Hardware and Operating System Technologies exams
  • Exam Readiness checklist at the front of the book--you're ready for the exam when...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
International Climate Agreements under Review: The Potential of Negotiation Linkage between Climate Change and Preferential Free Trade (Energiepolitik ... Energy Policy and Climate Protection)
International Climate Agreements under Review: The Potential of Negotiation Linkage between Climate Change and Preferential Free Trade (Energiepolitik ... Energy Policy and Climate Protection)
Given the shortcomings of the Paris Agreement, Anja Zenker examines the potential of free trade benefits as an incentive mechanism for an effective and stable climate change cooperation of states. She addresses the question of how the specific policy design affects the success of the agreement, market and trade outcomes, as well as the...
Causes of War
Causes of War

Written by leading scholars in the field, Causes of War provides the first comprehensive analysis of the leading theories relating to the origins of both interstate and civil wars.

  • Utilizes historical examples to illustrate individual theories throughout
  • Includes an analysis of theories of civil wars...
Smart Card Handbook
Smart Card Handbook

The most comprehensive book on state-of-the-art smart card technology available

Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...

Brain Damage and Repair: From Molecular Research to Clinical Therapy
Brain Damage and Repair: From Molecular Research to Clinical Therapy

This book builds a novel bridge from molecular research to clinical therapy. This approach reveals the functional features of neurons and glia in the particular context of vulnerability and self-protection, intracellular properties and extracellular matrix. Arising from this platform, this volume unfolds the molecular and systemic processes...

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy