Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Criminology For Dummies
Criminology For Dummies

Your thorough guide to comprehending and combating crime

Are you fascinated by criminology, forensics, and detective work? This you-are-there guide takes you deep into the world of crime, giving you a better understanding of the dark recesses of the criminal mind and how law enforcement officials investigate crime. You'll gain real-world...

Deadly Connections: States that Sponsor Terrorism
Deadly Connections: States that Sponsor Terrorism
"Dan Byman has written what will likely become the standard text on state-sponsored terrorism. Deadly Connections is an important book that not only fills a long-standing gap in the field of terrorism studies, but significantly advances our understanding of this particularly opaque and complex phenomenon." --Bruce Hoffman, author of...
Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

Differential Diagnosis in Neurology (Biomedical and Health Research, Vol. 67)
Differential Diagnosis in Neurology (Biomedical and Health Research, Vol. 67)

Differential Diagnosis in Neurology grew out of the author's daily morning reports with neurology residents and the examination of patients in front of colleagues over the last 30 years. The essence of 'differential diagnosis' is 'splitting' rather than 'lumping'. It requires bringing knowledge to the table and...

The Palgrave Handbook of Philosophy and Public Policy
The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues...
Encyclopedia of Disasters: Environmental Catastrophes and Human Tragedies
Encyclopedia of Disasters: Environmental Catastrophes and Human Tragedies
This encyclopedia is a descriptive, illustrated account of disasters, both natural and human-induced, that have occurred throughout the world at different times over the past two thousand years. They include experiences of earthquakes, tsunamis, volcanic eruptions, floods, extremes of weather, droughts, pandemic illnesses, land subsidence and...
Six-Legged Soldiers: Using Insects as Weapons of War
Six-Legged Soldiers: Using Insects as Weapons of War
"Six-Legged Soldiers is an excellent account of the affect arthropod-borne diseases have had on warfare...This book will inspire readers to understand...threats and prepare new methods to combat them."--Nature, November 2008

"Both science and military history buffs will learn much from Lockwood, a self-described skeptic
...
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Using OpenCL: Programming Massively Parallel Computers (Advances in Parallel Computing)
Using OpenCL: Programming Massively Parallel Computers (Advances in Parallel Computing)

In 2011 many computer users were exploring the opportunities and the benefits of the massive parallelism offered by heterogeneous computing. In 2000 the Khronos Group, a not-for-profit industry consortium, was founded to create standard open APIs for parallel computing, graphics and dynamic media. Among them has been OpenCL, an open system...

Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
This book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy