 |
|
 Toxicology and Ecotoxicology in Chemical Safety Assessment
The use of chemicals in any workplace in the developed world is governed by stringent health, safety and environmental legislation, and companies spend significant amounts of time and money assessing the risks associated with the handling and use of chemicals. In practice, those risk assessments are generally carried out by a range of... |  |  The Rosedale Diet
Finally—the ultimate diet for fast, safe weight loss, lifelong health, and longer life, based on more than twenty years of research and the latest findings on appetite and weight. Metabolic specialist Ron Rosedale, M.D., has designed the Rosedale Diet to regulate the powerful hormone leptin, which controls appetite and weight loss by... |  |  Standard Handbook of Machine Design
The definitive machine design handbook for mechanical engineers, product designers, project engineers, design engineers, and manufacturing engineers covers every aspect of machine construction and operation. The 3rd edition of the Standard Handbook of Machine Design will be redesigned to meet the challenges of a new mechanical engineering... |
|
 Tcl 8.5 Network Programming
Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving... |  |  Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... |  |  Integrating Macs into Windows Networks (Network Pro Library)
Integrate Macs seamlessly into your Windows network
These days, almost every Windows network must include Macs--and not just as second-class citizens with limited connectivity, but as full members of the network. Covering Mac OS X Snow Leopard and Windows Server 2008 R2, Integrating Macs into Windows Networks shows you how... |
|
 Dangerous Games (Tempting SEALs)
Navy SEAL Clint "Iceman" McIntire didn't earn his nickname by being a coward. Or a quitter. Having crushed an infamous drug cartel in Colombia, Clint was nothing short of an American hero. Now he's home, on a much-needed leave, but instead of some R&R, he finds himself neck-deep in trouble with his best ... |  |  Role-Based Access Control
Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,... |  |  The Gale Encyclopedia of Children's Health: Infancy Through Adolescence
The safety of children is potentially at risk from accidents and injuries, as well as crime. Providing a safe environment, putting prevention measures into practice, and teaching children methods of self-protection are all ways to reduce the potential for harm to children.
Description
Accidents are the leading cause of... |
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |