Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing inf
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
Large sensor video cameras (DSLRs) offer filmmakers an affordable, high-quality image previously impossible without high-end cinema cameras. These video-capable DSLR cameras have revolutionized filmma
The proliferation of weapons of mass destruction, in the hands of both states and terrorist networks, is considered by many to be the greatest threat to global security today. Contemporary Nuclear De
Design and develop Java-based, data-driven applications using Spring and Hibernate technology Spring 4 and Hibernate 4: Agile Java Design and Development covers real-world applications for developing
This is an introduction to the law governing security interests in personal property, which is based on Article 9 of the UCC. This book explains terminology, structure, and methodology of security int
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
The first really easy-to-use consumer guide to buying, installing, and using electronic gadgetry including HDTVs and home networks, tablets, smart phones, MP3 players, GPS systems, car electronics and
Fully revised and updated for the new edition, the Oxford Handbook of Psychiatry provides the most up-to-date information clinically relevant to the doctor on the ground. Using a presentation-based fo
DAVID BUSCH'S NIKON D4 GUIDE TO DIGITAL SLR PHOTOGRAPHY is your best bet for getting great results with your D4. Nikon's new flagship camera, the D4 includes a 16.2 megapixel sensor, advanced HDTV vid
DAVID BUSCH'S SONY ALPHA SLT-A65 GUIDE TO DIGITAL PHOTOGRAPHY is your best bet for getting the most out of your Alpha SLT-A65. Built with the same successful "translucent mirror technology" and sensor
Discusses the controversies regarding privacy and surveillance, including the ethical aspects of electronic surveillance of citizens by the government, security of identity over the Internet, and stud
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
A master kindergarten teacher shares her classroom-tested, inquiry-based lessons for using picture book and concept book favorites to help young learners build skills in number sense, basic operations
Using musical allusion and metaphor, juxtaposing history and autobiography, Matejka navigates a triracial identity. In these poems, having too many heritages means having no heritage at all. As a resu
The Picture Clue books are based on the traditional "rebus Reader" - using a picture as a tool for learning a word. On the sample spread, you can see where a picture is substituted for a word. This
It’s Princess Aurora’s birthday, and the good fairies want to prepare a surprise for her without using any magic. Young readers will enjoy the fun and mayhem that ensues in this Step 2 reader based up
Artificial neural networks are nonlinear mapping systems whose structure is loosely based on principles observed in the nervous systems of humans and animals. The basic idea is that massive systems of
Not the results of the Survey at the End of the Universe, but a guide for security professionals to assessing in detail the security status, deficiencies and excesses, and needs of a client such as an
Neural networks usually work adequately on small problems but can run into trouble when they are scaled up to problems involving large amounts of input data. Circuit Complexity and Neural Networks add
Wireless Imagination directly addresses what is perhaps the most conspicuous silence in contemporary theory and art criticism, the silence that surrounds the polyphonous histories of audio and radio
此書配合108課綱,三民普通型高級中學英文課本內容編寫。是自主學習、課後複習最佳夥伴。本書針對課本的重點:課文、單字片語、句型詳加解析,並搭配專業老師精心編寫的即時練習,讓學習有重點,效率高。 Read About It: 逐句講解課本裡,每課課文文法重點、句構並提供中文翻譯。 Words for Production & Idioms
此書配合108課綱,三民普通型高級中學英文課本內容編寫。是自主學習、課後複習最佳夥伴。本書針對課本、附冊的重點:課文、單字片語、句型詳加解析,並搭配專業老師精心編寫的即時練習,讓學習有重點,效率高。 Read About It: 逐句講解課本裡,每課課文文法重點、句構並提供中文翻譯。 Words for Production & Idioms an
此書配合108課綱,三民普通型高級中學英文課本內容編寫。是自主學習、課後複習最佳夥伴。本書針對課本、附冊的重點:課文、單字片語、句型詳加解析,並搭配專業老師精心編寫的即時練習,讓學習有重點,效率高。 Read About It: 逐句講解課本裡,每課課文文法重點、句構並提供中文翻譯。 Words for Production & Idi
此書配合108課綱,三民普通型高級中學英文課本內容編寫。是自主學習、課後複習最佳夥伴。本書針對課本、附冊的重點:課文、單字片語、句型詳加解析,並搭配專業老師精心編寫的即時練習,讓學習有重點,效率高。 Read About It: 逐句講解課本裡,每課課文文法重點、句構並提供中文翻譯。 Words for Production & Idi
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
The ultimate Code reference for construction is back -- and this time it's more current than ever, using the 2018 International Residential Code as the foundation for learning common Code requirements
Veteran photographer and instructor Bryan Peterson is best known for his arresting imagery using bold, graphic color and composition. Here he explores his signature use of color in photography for the
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
State secrecy is increasingly used as the explanation for the shrinking of public discussion surrounding national security issues. The phrase that’s classified” is increasingly used not to protect nat