|
|
|
|
The Evolution DeceitFor some people the theory of evolution or Darwinism has only scientific connotations, with seemingly no direct implication in their daily lives. This is, of course, a common misunderstanding. Far beyond just being an issue within the framework of the biological sciences, the theory of evolution constitutes the underpinning of a deceptive... | | | | Fundamentals of Cryptology: A Professional Reference and Interactive TutorialThe protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g.... |
|
|
Cisco IOS EssentialsWho cares about configuring network routers? Network routers are a major part of the glue that holds all computer networks together. Routers are supposed to configure themselves right? Not really. Routers aren’t to the point of being able to configure themselves, yet. They have no artificial intelligence agent so almost everything on them... | | Java 2: The Complete Reference, Third EditionThe definitive guide to Java!
Master Java, the pre-eminent language of the Internet, and begin reaping the benefits of this secure, platform-independent programming language. Let #1 programming author Herb Schildt show you everything you need to develop, compile, debug, and run Java applications and applets. Covering all of Java 2,... | | Faulk's Basic Forensic Psychiatry
After the second edition was published (in 1994), a number of changes have taken place, including changes in the law, advances in treatment, and changes in the management of prisons and special hospitals.
The book remains essential reading for doctors taking the Membership examination of the Royal College of Psychiatrists, but also... |
|
|
|
Result Page: Previous 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next |