Neuroanatomy and Neuroscience at a Glance provides a user-friendly introduction to the anatomy, biochemistry, physiology and pharmacology of the human nervous system within one, succinct, highly-illus
It's Enough to Make You Sick explains how the American health care system developed and how it has deteriorated into a national disgrace. Lobosky indicts the special interests who have played a role i
Perfect for getting children away from computer games and out into the open air to discover nature, this colorful, easy, and fun bird guide is ideal for beginning birders. Spot the Bird covers more th
When a killer known only as "the Palestinian" brutally murders the head of Egypt's State Internal Security, the CIA unleashes the Scorpion --a former Company operative who is the only one who can save
The thrilling history and behind-the-scenes story of Watson, the computer created by IBM scientists to take on two masters of Jeopardy!, Ken Jennings and Brad Rutter, in a fast-paced look at how smart
What should medicine do when it can’t save your life?The modern healthcare system has become proficient at staving off death with aggressive interventions. And yet, eventually everyone dies—and althou
"Future presidents will need to find the right balance in China policy, so as to maintain America's strength and watchfulness but not fall into the classic security dilemma, wherein each side believes
Students are guided through the latest trends in computer concepts and technology in an exciting and easy-to-follow format. Updated for currency, DISCOVERING COMPUTERS provides s the most up-to-date i
Exogene (n.): factor or agent (as a disease-producing organism) from outside the organism or system. Also: classified Russian program to merge proto-humanoids with powered armor systems (slang).Cather
With a New Introduction by Mary Gaitskill A PEN/Hemingway Award Finalist A New York Times Book Review Notable Book Ellen Ullman is a "rarity, a computer programmer with a poet’s feeling for language"
Due to their use and importance in many fields, a great deal of research focuses on developing inorganic materials. For example, a computer contains many types of inorganic materials, including the gl
On your markPrivate, the world's most renowned investigation firm, has been commissioned to provide security for the 2012 Olympic Games in London. Its agents are the smartest, fastest, and most techno
The authors offer an analysis of whether Norway's recent gender quota for public liability companies has had positive or negative effects on economic performance, and why the quota system has been ado
A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris. Well regarded for its engaging and informative styl
By the author of A Nation of Victims: a real-world antidote to our broken economic system that leaves some Americans paying for the irresponsibility of othersHave we reached a tipping point where more
Offering a clear analysis of the danger of nuclear terrorism and how it can be prevented, The Partnership sheds light on one of the most divisive security issues facing Washington today. Award-winning
Describes the hieroglyphic writing system of ancient Egypt, and recounts how it was replaced by other types of writing and how people learned to read it once again after the discovery of the Rosetta S
As vampires from all over the world descend on the Drake farm for the Blood Moon gathering, security is ramped up. Lucy has been temporarily banned, for her own safety—and to allow Solange some time t
When fourteen-year-old Everett Singh's scientist father is kidnapped from the streets of London, he leaves a mysterious app on Everett's computer giving him access to the Infundibulum--a map of parall
Discusses the controversies regarding privacy and surveillance, including the ethical aspects of electronic surveillance of citizens by the government, security of identity over the Internet, and stud
The development of a legal regime to combat domestic violence in the United States has been lauded as one of the feminist movement’s greatest triumphs. But, Leigh Goodmark argues, the resulting system
From his youth as a soldier to his service in government, Ariel Sharon has personified Israel?s drive for security. His leadership during the Six-Day and Yom Kippur wars made him a national hero and p
A woman with a murky past who kills herself—or was it murder? A spoiled kid awash in gambling debt who thinks he can beat the system. A lovely woman whose life is about to splinter into a thousand fra
"This is one of the most interesting infosec books to come out in the last several years."–Dino Dai Zovi, Information Security Professional"Give a man an exploit and you make him a hacker for a day; t
When ten-year-old Megan helps her uncle invent the Thumbtop, the world's smallest computer, mice are overjoyed, and they want one for every mouse hole.The Big Cheese, leader of the Mouse Nation, has o
THE DEFINITIVE GUIDE TO HVAC DESIGNThis practical manual describes the HVAC system design process step by step using photographs, drawings, and a discussion of pertinent design considerations for diff
From one of the world’s most admired women, this is former National Security Advisor and Secretary of State Condoleezza Rice’s compelling story of eight years serving at the highest levels of governme
CALL IT THE BUDDY SYSTEM, because Baking with the Cake Boss is an education in the art of baking and decorating, from kneading to rolling, fondant to flowers, taught by Buddy Valastro himself, the sta
Ian Cormac is a legendary Earth Central Security agent, the James Bond of a wealthy future, the AI-ruled Polity of Worlds. Mr. Crane is an insane killer android, formerly believed destroyed, whose art
From one of the world’s most admired women, this is former National Security Advisor and Secretary of State Condoleezza Rice’s compelling story of eight years serving at the highest levels of governme
Set in the future when teenagers are monitored via camera and their recorded actions and confessions plugged into a computer program that determines their ability to succeed. All kids given a "score"
WHO IS BARACK HUSSEIN OBAMA? 2008, the left wing and the Corporate Mainstream Media (CMM) fell head over heels in love with a cool, charming, and attractive smooth talker. His social security number (
New York Times and USA TODAY bestselling author Brenda Jackson presents a brand-new tale of temptation in Texas.Millionaire rancher Zeke Travers is an expert in security matters. He always separates e
《CISSP認證考試指南(第5版)》提供最新最全的資源,涵蓋通過CISSP(Certified Information Systems Security Professional,信息系統安全專家認證)考試所需的全部信息,內容涉及(ISC)2(International Information Systems Se
Behind the well-known U.S. security organizations— the FBI and CIA among them—lies a heavily guarded, anonymous government agency dedicated to intelligence surveillance and to a highly specialized bra
A certain politician has his own private security group. In that group is someone special. That man is, Aoi, who's extremely capable at his job, handling even dirty work with ease. But in that heart l
Efficiently organized according to the Scott numbering system, a uniquely reliable guide to U.S. postage stamps issued from 1847 to the present lists thousands of prices for stamps, mint sheets, first
Explode the myth that you need to earn a high income to become rich Challenge the belief that your house is an asset Show parents why they can't rely on the school system to teach their kids about m