|
|
|
Selenium in Food and Health
Selenium is a contradictory nutrient. It has been called the essential poison—too
much of it in the diet can be toxic; too little can result in chronic, and sometimes
fatal, deficiency. Even health authorities have at times been confused. Although
today in the USA, as in most other countries, selenium appears among the trace... | | Data Abstraction & Problem Solving With C++: Walls & Mirrors
The classic, best-selling Data Abstraction and Problem Solving with C++: Walls and Mirrors book provides a firm foundation in data abstraction that emphasizes the distinction between specifications and implementation as the basis for an object-oriented approach. This new edition offers the latest C++ features and an introduction to using ... | | USB Mass Storage: Designing and Programming Devices and Embedded HostsA mass-storage device can provide access to data for just about any purpose. Every time you load an application or save a file on a PC, you’re using a mass-storage device. A computer’s hard drive is a mass-storage device, as are flash, CD, and DVD drives. Devices with dedicated functions—data loggers, robots, and other embedded... |
|
Real World Print ProductionWhat you see is not always what you geta truism that's nowhere more apparent than in print production, where what you see on screen is often a far cry from what comes out on the printed page. Here to help you avoid the production problems that plague many projects is a comprehensive guide to print production from one of the field's top... | | How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... | | Combating Spyware in the EnterpriseSpyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... |
|
Encyclopedia of Digital Governmentand interact with their stakeholders. This explains why digital government or electronic government (e-government) has become one of the most important topics in the public sector reform agenda. Such an e-transformation in government and public governance has its roots in the 1950s when some few professionals and academics started to speak about... | | Relativity: The Special and the General Theory (Penguin Classics)
The Nobel Prize-winning scientist’s presentation of his landmark theory
According to Einstein himself, this book is intended "to give an exact insight into the theory of Relativity to those readers who, from a general scientific and philosophical point of view, are interested in the theory, but who are not... | | Logic and the Modalities in the Twentieth Century, Volume 7 (Handbook of the History of Logic)
Logic and the Modalities in the Twentieth Century is an indispensable research tool for anyone interested in the development of logic, including researchers, graduate and senior undergraduate students in logic, history of logic, mathematics, history of mathematics, computer science and artificial intelligence, linguistics, cognitive science,... |
|
Result Page: Previous 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 Next |