Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Biology Demystified (TAB Demystified)
Biology Demystified (TAB Demystified)
Guide to understanding basic and applied scientific information, for those who've had not formal training in biology. Includes more than 150 illustrations, a pronunciation guide, self-tests, and reviews. Softcover. DLC: Biology.

UNDERSTAND BIOLOGY -- WITHOUT DISSECTING ANYTHING!

If you're years removed...

Fodder Crops and Amenity Grasses (Handbook of Plant Breeding)
Fodder Crops and Amenity Grasses (Handbook of Plant Breeding)

The main role of grasses, clovers and alfalfa in temperate agriculture is still to provide forage for ruminant animals but, in the last decades, the importance of amenity grasses increased markedly and, in the near future, new developments in the areas of energy and biomass use can be envisaged. Fodder Crops and Amenity Grasses, fifth volume in...

Ecological Connectivity among Tropical Coastal Ecosystems
Ecological Connectivity among Tropical Coastal Ecosystems

Mangrove forests, seagrass beds, and coral reefs are circumtropical ecosystems that are highly productive, and provide many important biological functions and economic services. These ecosystems cover large surface areas in the shallow tropical coastal seascape but have suffered from serious human degradation, especially in the last few decades....

iOS 6 Programming Cookbook
iOS 6 Programming Cookbook
The long-awaited iOS 6 SDK (Software Development Kit) is finally out, and we need to learn about all the great features that this release offers us. Apple did a great job adding new features to the SDK and, of course, to iOS itself. iOS 6 is much more stable than the previous versions of iOS, as you would expect....
Essentials of Apoptosis: A Guide for Basic and Clinical Research
Essentials of Apoptosis: A Guide for Basic and Clinical Research
Life and death are topics that no one takes lightly. In the cell, death by apoptosis is just as fundamental as proliferation for the maintenance of normal tissue homeostasis. Too much or too little apoptosis can lead to developmental abnormality, degenerative diseases, or cancers. Although apoptosis, or programmed cell death (PCD),...
Dewhurst's Textbook of Obstetrics and Gynaecology
Dewhurst's Textbook of Obstetrics and Gynaecology

This time honoured classic has been re-built completely: after six editions the editor has decided that a radical revision is necessary. The new edition has been developed as a result of intensive consultation with trainees in OB/GYN as to what they want, what they need and how they learn.

The book is organised into two halves...

Where Men Hide
Where Men Hide
"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide

Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,...

The Character of Physical Law (Messenger Lectures, 1964)
The Character of Physical Law (Messenger Lectures, 1964)

In these Messenger Lectures, originally delivered at Cornell University and recorded for television by the BBC, Richard Feynman offers an overview of selected physical laws and gathers their common features into one broad principle of invariance. He maintains at the outset that the importance of a physical law is not "how clever...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an...

IBM EServer Certification Study Guide - Pseries Aix System Support
IBM EServer Certification Study Guide - Pseries Aix System Support
This redbook is designed as a study guide for professionals wishing to prepare for the certification exam to achieve: IBM eserver Certified Specialist - pSeries AIX System Support. The system support certification validates a broad scope of AIX problem determination and resolution skills and the ability to perform general AIX software system...
unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy