|
|
|
|
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks
are constantly in the news these days, and everyone seems to be concerned
about them to some degree. Businesses everywhere are worried about
having
sensitive customer information such as credit card numbers or email
addresses
stolen, ... | | Biology Demystified (TAB Demystified)Guide to understanding basic and applied scientific information, for those who've had not formal training in biology. Includes more than 150 illustrations, a pronunciation guide, self-tests, and reviews. Softcover. DLC: Biology.
UNDERSTAND BIOLOGY -- WITHOUT DISSECTING ANYTHING!
If you're years removed... | | Fodder Crops and Amenity Grasses (Handbook of Plant Breeding)The main role of grasses, clovers and alfalfa in temperate agriculture is still to provide forage for ruminant animals but, in the last decades, the importance of amenity grasses increased markedly and, in the near future, new developments in the areas of energy and biomass use can be envisaged. Fodder Crops and Amenity Grasses, fifth volume in... |
|
Ecological Connectivity among Tropical Coastal EcosystemsMangrove forests, seagrass beds, and coral reefs are circumtropical ecosystems that are highly productive, and provide many important biological functions and economic services. These ecosystems cover large surface areas in the shallow tropical coastal seascape but have suffered from serious human degradation, especially in the last few decades.... | | iOS 6 Programming Cookbook
The long-awaited iOS 6 SDK (Software Development Kit) is finally out, and we need
to learn about all the great features that this release offers us. Apple did a great job
adding new features to the SDK and, of course, to iOS itself. iOS 6 is much more stable
than the previous versions of iOS, as you would expect. ... | | Essentials of Apoptosis: A Guide for Basic and Clinical Research
Life and death are topics that no one takes lightly. In the cell, death by apoptosis is just as
fundamental as proliferation for the maintenance of normal tissue homeostasis. Too much or
too little apoptosis can lead to developmental abnormality, degenerative diseases, or cancers.
Although apoptosis, or programmed cell death (PCD),... |
|
Dewhurst's Textbook of Obstetrics and Gynaecology
This time honoured classic has been re-built completely: after six editions the editor has decided that a radical revision is necessary. The new edition has been developed as a result of intensive consultation with trainees in OB/GYN as to what they want, what they need and how they learn.
The book is organised into two halves... | | Where Men Hide"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide
Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,... | | The Character of Physical Law (Messenger Lectures, 1964)
In these Messenger Lectures, originally delivered at Cornell University and recorded for television by the BBC, Richard Feynman offers an overview of selected physical laws and gathers their common features into one broad principle of invariance. He maintains at the outset that the importance of a physical law is not "how clever... |
|
Security in Computing Systems: Challenges, Approaches and Solutions
This monograph on Security in Computing Systems: Challenges, Approaches and
Solutions aims at introducing, surveying and assessing the fundamentals of secu
rity with respect to computing. Here, “computing” refers to all activities which
individuals or groups directly or indirectly perform by means of computing sys
tems,... | | Digital Evidence and Computer Crime, Second EditionDigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an... | | IBM EServer Certification Study Guide - Pseries Aix System SupportThis redbook is designed as a study guide for professionals wishing to prepare for the certification exam to achieve: IBM eserver Certified Specialist - pSeries AIX System Support. The system support certification validates a broad scope of AIX problem determination and resolution skills and the ability to perform general AIX software system... |
|
|
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 |