Related Articles
278 products
Advertisement
The felonious activities of confined inmates reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside
Current Offer
Loot.co.za
Practical Criminal Investigations In Correctional Facilities Hardcover
Although fuzzy systems and neural networks are central to the field of soft computing, most research work has focused on the development of the theories, algorithms, and designs of systems for specific
Current Offer
Loot.co.za
Fuzzy Neural Intelligent Systems - Mathematical Foundation And The Applications In Engineering Hardcover
Current Offer
Loot.co.za
Socio-technical Networks - Science And Engineering Design Hardcover
Current Offer
Loot.co.za
The Cost Manual Of Laboratory Animal Care And Use - Refinement Reduction And Research Hardcover
Digital technology now enables unparalleled functionality and flexibility in the capture, processing, exchange, and output of color images. But harnessing its potential requires knowledge of color science, systems, processing algorithms, and device
Recognized as an outstanding guide to traditional methods, the Handbook of Food Spoilage Yeasts, Second Edition upholds the reputation of its predecessor by providing an overview of non-conventional rapid and automated methods
Function transforms are some of the most important math tools for solving problems in all areas of engineering and the physical sciences. The author has compiled the most important and widely used
Current Offer
Loot.co.za
Handbook Of Function And Generalized Function Transformations Hardcover New
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive
Current Offer
Loot.co.za
Disruptive Security Technologies With Mobile Code And Peer-to-peer Networks Hardcover
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers
Current Offer
Loot.co.za
The Somatosensory System - Deciphering The Brain& 39 S Own Body Image Hardcover
From cell phones and television remote controls to automobile engines and spacecraft, microcontrollers are everywhere. Programming these prolific devices is a much more involved and integrated task than it is for general-purpose
This extensive library of computer programs-written in C language-allows readers to solve numerical problems in areas of linear algebra, ordinary and partial differential equations, optimization, parameter estimation, and special functions of mathematical
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs)