|
|
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant,
or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological
organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms,
such as animals,... | | Nutrient-Gene Interactions in Health and Disease (Modern Nutrition)
We have come to realize that optimal nutrient intake is determined by very specific genetic messages. This realization has led to an entirely new approach to understanding nutrition – the exploration of nutrient effects on gene expression.
Edited by leading experts in the field, Nutrient–Gene Interactions in Health... | | Investigating Computer-Related CrimeWritten by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic... |
|
|
Disruptive Security Technologies with Mobile Code and Peer-to-Peer NetworksThe traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities... | | | | |
|
Understanding Surveillance Technologies: Spy Devices, Their Origins & ApplicationsThis is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic... | | A Practical Approach to WBEM/CIM ManagementSystem architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,... | | Handbook of Wireless Local Area Networks: Applications, Technology, Security, and StandardsConsisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a... |
|
Result Page: Previous 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 Next |