|
|
|
|
Running Mac OS X PantherApple® has shown no mercy to the Macintosh® power user---that dedicated individual who knows their Mac® inside and out: what makes it tick, and what makes it tick better. In the rapid evolution of Mac OS® X, there have been three major releases, and each new release challenges the power user to once more stay ahead of the learning... | | Explosives and Chemical Weapons Identification (Forensic Science Techniques)I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.
What is a first responder? It is a phrase often mentioned in the press but rarely defined.
... | | Forensic Pathology of Trauma (Forensic Science and Medicine)
The practice of forensic pathology includes the collection and analysis of evidence
in relation to a corpse in order to establish the cause of death. Knowledge
of the cause of death contributes to the determination of the manner of death by medical
examiners and coroners, who are occasionally assisted by law enforcement officers. In... |
|
| | Redesigning Enterprise Processes for E-Business w/CD ROMThis is the decade of redesigning enterprise processes for e-business ! Creating a process advantage has always been a formidable strategic weapon for business enterprises, but the internet and e-business have brought new urgency to it. A different form of business process redesign or reengineering (BPR) has been ignited by e-business to create... | | |
|
Dungeons & Dragons DummiesCaught in traffic. Trapped in a cubicle. Stuck in a rut. Tangled up in red tape.
In the real world, sometimes you feel powerless—but not in Dungeons & Dragons (D & D). In this fantasy-adventure, you have all kinds of special powers. You can slay the evil dragon, overcome the orc or the ogre, haunt the... | | Modular Java: Creating Flexible Applications with OSGi and SpringThe secret weapon for attacking complexity in any project is to break it down into smaller, cohesive, and more easily digestible pieces. With Modular Java, you can easily develop applications that are more flexible, testable, maintainable, and comprehensible. Modular Java is a pragmatic guide to developing modular... | | |
|
Phishing ExposedPhishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with... | | | | The Photoshop Elements 7 Book for Digital Photographers This book breaks new ground by doing something for digital photographers that’s never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure things out on your own. Instead, it does... |
|
|
Result Page: 7 6 5 4 3 2 1 |