Home | Amazing | Today | Tags | Publishers | Years | Search 
The Use of Forensic Anthropology, Second Edition
The Use of Forensic Anthropology, Second Edition
This book is written for medical examiners, coroners, and other law enforcement officers who are responsible for conducting death investigations. Forensic analysis has become and will continue to be a complex and highly specialized field of study. No longer can the lone investigator take on the responsibilities of doing all the work of recovery,...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Handbook of Cosmetic Science and Technology, Third Edition
Handbook of Cosmetic Science and Technology, Third Edition

Thanks to the contribution of leading experts in cosmetology, the first editions of the Handbook were successful and received excellent reviews. The editors appreciate the excellent author contributions.

The first edition, published in 2001, reviewed the multiple facets of the cosmetic field including the physiology of...

Chemical Analysis of Firearms, Ammunition, and Gunshot Residue
Chemical Analysis of Firearms, Ammunition, and Gunshot Residue
There are numerous detailed books on firearms available for enthusiasts, the vast majority of the books concentrating on the physical aspects of firearms. Very little has been published on the chemical aspects of firearms and ammunition and what has been published is sparse and fragmented in the literature. One of the reasons for this is that...
Scientific Data Management: Challenges, Technology, and Deployment
Scientific Data Management: Challenges, Technology, and Deployment

Dealing with the volume, complexity, and diversity of data currently being generated by scientific experiments and simulations often causes scientists to waste productive time. Scientific Data Management: Challenges, Technology, and Deployment describes cutting-edge technologies and solutions for managing and analyzing vast...

Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
VoIP Handbook: Applications, Technologies, Reliability, and Security
VoIP Handbook: Applications, Technologies, Reliability, and Security
The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.

The VoIP Handbook: Applications, Technologies, Reliability, and...

Post-Oil Energy Technology: The World's First Solar-Hydrogen Demonstration Power Plant
Post-Oil Energy Technology: The World's First Solar-Hydrogen Demonstration Power Plant
A solution to the climate and energy crisis

Demonstrating the feasibility of a clean, renewable global energy future, Post-Oil Energy Technology: The World’s First Solar-Hydrogen Demonstration Power Plant describes the detailed design of the first 1,000 megawatt solar power plant with hydrogen storage.

...
VMware ESX Essentials in the Virtual Data Center
VMware ESX Essentials in the Virtual Data Center
The VMware ESX server is vital to virtualization methods used to perform server consolidation, software development, test automation, legacy Windows migration, and more. Server virtualization can drastically cut business costs, and considering that there are few experts in the field, VMware ESX Essentials in the Virtual Data...
Data and Safety Monitoring Committees in Clinical Trials (Chapman & Hall/Crc Biostatistics)
Data and Safety Monitoring Committees in Clinical Trials (Chapman & Hall/Crc Biostatistics)
In the world of drug development, clinical issues and statistical issues cannot be separated. All are scientific and all use applied logic. However, safety monitoring in pharmaceutical industry clinical trials through data monitoring committees (DMCs) is both an art and a science, requiring the use of sound judgment as well as sound scientific...
Creating Spatial Information Infrastructures: Towards the Spatial Semantic Web
Creating Spatial Information Infrastructures: Towards the Spatial Semantic Web
The concept of information infrastructures is an important one in many countries and organizations for improving the management of distributed information. Many national and international efforts are ongoing to create such information infrastructures, in parallel with research activities to fi nd answers to the remaining problems when realizing...
Leading IT Projects: The IT Manager's Guide
Leading IT Projects: The IT Manager's Guide
Senior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill...
Result Page: Previous 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy