Search Results - "detective"
Suggested Topics within your search.
Suggested Topics within your search.
- Detective and mystery stories 144
- Fiction 122
- Detective and mystery stories, English 74
- methods 63
- Mystery and detective stories 52
- Women detectives 46
- diagnosis 45
- Private investigators 36
- Murder 32
- Computer networks 30
- Prevention 30
- English fiction 29
- Investigation 29
- Police 24
- Security measures 24
- Fraud 23
- therapy 22
- analysis 20
- Computer security 18
- Detective and mystery stories, American 18
- Food 15
- prevention & control 15
- Malay fiction 14
- Detection 13
- Research 13
- Signal processing 13
- Fraud investigation 12
- Measurement 12
- Signal detection 12
- Corrupt practices 11
-
761
Cytochrome P450 protocols
Published 2006Table of Contents: “…Waxman -- CYP2C19-mediated (S)-mephenytoin 4'-hydroxylation assayed by high-performance liquid chromatography with radiometric detection / Charles L. Crespi, Thomas K.H. Chang, and David J. …”
Click Here to View Status and Holdings.
Book -
762
Cerebral microbleeds pathophysiology to clinical practice
Published 2011Table of Contents: “…Historical overview: microaneurysms, cerebral microbleedsand, intracerebral hemorrhage / Varinder Singh Alg and David J. Werring -- Detection of microbleeds : physical principles, technical aspects and new -- Developments / Maarten J. …”
Click Here to View Status and Holdings.
Book -
763
Clinical manual of adolescent substance abuse treatment
Published 2011Table of Contents: “….] -- Screening, assessment, and triage for treatment at a primary care setting / Sharon Levy, John Knight & Ken Winters -- Bio-essays and the detection of substances of abuse in youth : challenges and opportunities / Janelle Arias, Albert Arias & Yifrah Kaminer -- Placement criteria and integrated treatment services for adolescents with psychiatric comorbidity / Marc Fishman -- From assessment through treatment (in)to aftercare : continuity of care and outcome / Ken Winters & Yifrah Kaminer -- Pharmacotherapy of adolescent substance use disorders / Yifrah Kaminer & Lisa Marsch -- Club drugs, prescription, and over the counter medication abuse : description, diagnosis, and intervention / Christian Hopfer -…”
Click Here to View Status and Holdings.
Book -
764
Early pregnancy
Published 2010Table of Contents: “…Ectopic pregnancy Emma Kirk and Tom Bourne; 4. Ultrasound detection of uterine anomaly Dimitrios Mavrelos and Davor Jurkovic; 5. …”
Click Here to View Status and Holdings.
Book -
765
Nanomedicine and cancer
Published 2012Table of Contents: “….] -- Fluorescence nanoprobe imaging tumor by sensing the acidic microenvironment / Lu Wang and Cong Li -- Magnetic nanorings and nanotubes for cancer detection and therapy / Hai Ming Fan and Malini Olivo -- Silicon nanowire arrays and other silicon nanostructures and their clinical applications to cancer / Murugan Veerapandian and Min-Ho Lee -- Silver nanomedicine and cancer / ... …”
Click Here to View Status and Holdings.
Book -
766
ORGANIC CHEMISTRY
Published 2012Table of Contents: “…Further reading3 Determining organic structures; Introduction; Mass spectrometry; Mass spectrometry detects isotopes; Atomic composition can be determined by high-resolution mass spectrometry; Nuclear magnetic resonance; Regions of the [sup(13)]C NMR spectrum; Different ways of describing chemical shift; A guided tour of the [sup(13)]C NMR spectra of some simple molecules; The [sup(1)]H NMR spectrum; Infrared spectra; Mass spectra, NMR, and IR combined make quick identification possible; Double bond equivalents help in the search for a structure; Looking forward to Chapters 13 and 18. …”
Click Here to View Status and Holdings.
Manuscript Book -
767
Protocols for high-risk pregnancies
Published 2005Table of Contents: “…Hobbins -- Sonographic detection of aneuploidy / Fergal D. Malone -- Indices of maturity / Alessandro Ghidini and Anna Locatelli -- Clinical use of doppler / Henry L. …”
Click Here to View Status and Holdings.
Book -
768
Grossman's cardiac catheterization, angiography, and intervention
Published 2005Table of Contents: Click Here to View Status and Holdings.
Book -
769
Ophthalmology at a glance
Published 2014Table of Contents: “…Section 9 Sub-specialty: External eye disease 32 Common conditions affecting the external eye 33 Common conditions affecting the cornea 34 Medical uses of contact lenses 35 Corneal and laser refractive surgery Section 10 Sub-specialty: Corneal, refractive and cataract surgery 36 Cataract assessment 37 Cataract surgery 38 Cataract surgery postoperative care Section 11 Sub-specialty: Glaucoma 39 Glaucoma: the basics 40 Detecting glaucoma 41 Medical and surgical treatment of glaucoma Section 12 Sub-specialty: Vitreo-retinal 42 Retinal detachment 43 Retinal and choroidial anatomy and imaging 44 Inherited retinal dystrophies and age-related macular degeneration 45 Diabetic retinopathy classification and typical lesions 46 Diabetic retinopathy treatment 47 Retinal vein occlusion 48 Retinal artery obstruction 49 HIV infection and AIDS 50 Tropical ophthalmology: tropical eye disease 51 Tropical ophthalmology: global eye health Section 13 Sub-specialty: Neuro-ophthalmology 52 Pupil abnormalities 53 Optic nerve disease 54 Cranial nerve palsies and eye movement disorders 55 Visual field defects 56 Giant cell arteritis Appendix I: Red eye.…”
Click Here to View Status and Holdings.
Book -
770
DATA AND COMPUTER COMMUNICATIONS
Published 2014Table of Contents: “…Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERVIEW Chapter 1 Data Communications, Data Networks, and the Internet 1.1 Data Communications and Networking for Today's Enterprise 1.2 A Communications Model 1.3 Data Communications 1.4 Networks 1.5 The Internet 1.6 An Example Configuration Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications 2.1 The Need for a Protocol Architecture 2.2 A Simple Protocol Architecture 2.3 The TCP/IP Protocol Architecture 2.4 Standardization within a Protocol Architecture 2.5 Traditional Internet-Based Applications 2.6 Multimedia 2.7 Sockets Programming 2.7 Recommended Reading 2.8 Key Terms, Review Questions, and Problems Appendix 2A The Trivial File Transfer Protocol PART TWO DATA COMMUNICATIONS Chapter 3 Data Transmission 3.1 Concepts and Terminology 3.2 Analog and Digital Data Transmission 3.3 Transmission Impairments 3.4 Channel Capacity 3.5 Recommended Reading 3.6 Key Terms, Review Questions, and Problems Appendix 3A Decibels and Signal Strength Chapter 4 Transmission Media 4.1 Guided Transmission Media 4.2 Wireless Transmission 4.3 Wireless Propagation 4.4 Line-of-Sight Transmission 4.5 Recommended Reading 4.6 Key Terms, Review Questions, and Problems Chapter 5 Signal Encoding Techniques 5.1 Digital Data, Digital Signals 5.2 Digital Data, Analog Signals 5.3 Analog Data, Digital Signals 5.4 Recommended Reading 5.5 Key Terms, Review Questions, and Problems Chapter 6 Error Detection and Correction 6.1 Types of Errors 6.2 Error Detection 6.3 Parity Check 6.4 The Internet Checksum 6.5 Cyclic Redundancy Check (CRC) 6.6 Forward Error Correction 6.7 Recommended Reading 6.8 Key Terms, Review Questions, and Problems Chapter 7 Data Link Control Protocols 7.1 Flow Control 7.2 Error Control 7.3 High-Level Data Link Control (HDLC) 7.4 Recommended Reading 7.5 Key Terms, Review Questions, and Problems Appendix 7A Performance Issues Chapter 8 Multiplexing 8.1 Frequency-Division Multiplexing 8.2 Synchronous Time-Division Multiplexing 8.3 Cable Modems 8.4 Asymmetric Digital Subscriber Line 8.5 xDSL 8.6 Multiple Channel Access 8.7 Recommended Reading 8.8 Key Terms, Review Questions, and Problems PART THREE WIDE AREA NETWORKS Chapter 9 WAN Technology and Protocols 9.1 Switched Communications Networks 9.2 Circuit Switching Networks 9.3 Circuit Switching Concepts 9.4 Softswitch Architecture 9.5 Packet-Switching Principles 9.6 Asynchronous Transfer Mode 9.7 Recommended Reading 9.8 Key Terms, Review Questions, and Problems Chapter 10 Cellular Wireless Networks 10.1 Principles of Cellular Networks 10.2 Cellular Network Generations 10.3 LTE-Advanced 10.4 Recommended Reading 10.5 Key Terms, Review Questions, and Problems PART FOUR LOCAL AREA NETWORKS Chapter 11 Local Area Network Overview 11.1 Bus and Tree Topologies 11.2 LAN Protocol Architecture 11.3 Bridges 11.4 Hubs and Switches 11.5 Virtual LANs 11.6 Recommended Reading 11.7 Key Terms, Review Questions, and Problems Chapter 12 Ethernet 12.1 Traditional Ethernet 12.2 High-Speed Ethernet 12.3 IEEE 802.1Q VLAN Standard 12.4 Recommended Reading 12.5 Key Terms, Review Questions, and Problems Appendix 12A Digital Signal Encoding for LANs Appendix 12B Scrambling Chapter 13 Wireless LANs 13.1 Overview 13.2 IEEE 802.11 Architecture and Services 13.3 IEEE 802.11 Medium Access Control 13.4 IEEE 802.11Physical Layer 13.5 Gigabit Wi-Fi 13.6 IEEE 802.11 Security Considerations 13.7 Recommended Reading 13.8 Key Terms, Review Questions, and Problems PART FIVE INTERNET AND TRANSPORT LAYERS Chapter 14 The Internet Protocol 14.1 Principles of Internetworking 14.2 Internet Protocol Operation 14.3 Internet Protocol 14.4 IPv6 14.5 Virtual Private Networks and IP Security 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 Transport Protocols 15.1 Connection-Oriented Transport Protocol Mechanisms 15.2 TCP 15.3 UDP 15.4 Recommended Reading 15.5 Key Terms, Review Questions, and Problems UNIT TWO ADVANCED TOPICS IN DATA COMMUNICATIONS AND NETWORKING PART SIX DATA COMMUNICATIONS AND WIRELESS NETWORKSChapter 16 Advanced Data Communications Topics 16.1 Analog Data, Analog Signals 16.2 Forward Error Correction Codes 16.3 ARQ Performance Issues 16.4 Recommended Reading 16.5 Key Terms, Review Questions, and Problems Chapter 17 Wireless Transmission Techniques 17.1 MIMO Antennas 17.2 OFDM, OFDMA, and SC-FDMA 17.3 Spread Spectrum 17.4 Direct Sequence Spread Spectrum 17.5 Code-Division Multiple Access 17.6 Recommended Reading 17.7 Key Terms, Review Questions, and Problems Chapter 18 Wireless Networks 18.1 Fixed Broadband Wireless Access 18.2 WiMAX/IEEE 802.16 18.3 Bluetooth Overview 18.4 Bluetooth Radio Specification 18.5 Bluetooth Baseband Specification 18.6 Bluetooth Logical Link Control and Adaptation Protocol 18.7 Recommended Reading 18.8 Key Terms, Review Questions, and Problems PART SEVEN INTERNETWORKING Chapter 19 Routing 19.1 Routing in Packet-Switching Networks 19.2 Examples: Routing in ARPANET 19.3 Internet Routing Protocols 19.4 Least-Cost Algorithms 19.5 Recommended Reading 19.6 Key Terms, Review Questions, and Problems Chapter 20 Congestion Control 20.1 Effects of Congestion 20.2 Congestion Control 20.3 Traffic Management 20.4 Congestion Control in Packet-Switching Networks 20.5 TCP Congestion Control 20.6 Datagram Congestion Control Protocol 20.7 Recommended Reading 20.8 Key Terms, Review Questions, and Problems Chapter 21 Internetwork Operation 21.1 Multicasting 21.2 Software Defined Networks 21.3 OpenFlow 21.4 Mobile IP 21.5 Recommended Reading 21.6 Key Terms, Review Questions, and Problems Chapter 22 Internetwork Quality of Service 22.1 QoS Architectural Framework 22.2 Integrated Services Architecture 22.3 Resource Reservation Protocol 22.4 Differentiated Services 22.5 Service Level Agreements 22.6 IP Performance Metrics 22.7 Recommended Reading 22.8 Key Terms, Review Questions, and Problems Chapter 23 Multiprotocol Label Switching 23.1 The Role of MPLS 23.2 Background 23.3 MPLS Operation 23.4 Labels 23.5 FECs, LSPs, and Labels 23.6 Label Distribution 23.7 Traffic Engineering 23.8 Virtual Private Networks 23.9 Recommended Reading 23.10 Key Terms, Review Questions, and Problems PART EIGHT INTERNET APPLICATIONS Chapter 24 Electronic Mail, DNS, and HTTP 24.1 Electronic Mail: SMTP and MIME 24.2 Internet Directory Service: DNS 24.3 Web Access: HTTP 24.4 Recommended Reading 24.5 Key Terms, Review Questions, and Problems Chapter 25 Internet Multimedia Support 25.1 Real-Time Traffic 25.2 Voice Over IP 25.3 Session Initiation Protocol 25.4 Real-Time Transport Protocol 25.5 Recommended Reading 25.6 Key Terms, Review Questions, and Problems APPENDICES Appendix A Fourier Analysis A.1 Fourier Series Representation of Periodic Signals A.2 Fourier Transform Representation of Aperiodic Signals A.3 Recommended Reading Appendix B Projects and Other Student Exercises for Teaching Data and Computer Communications B.1 Animations and Animation Projects B.2 Practical Exercises B.3 Sockets Projects B.4 Wireshark Projects B.5 Simulation and Modeling Projects B.6 Performance Modeling B.7 Research Projects B.8 Reading/Report Assignments B.9 Writing Assignments B.10 Discussion TopicsReferences Index ONLINE CHAPTERS AND APPENDICES[1] PART NINE NETWORK SECURITY Chapter 26 Computer and Network Security Threats 26.1 Computer Security Concepts 26.2 Threats, Attacks, and Assets 26.3 Intruders 26.4 Malicious Software Overview 26.5 Viruses, Worms, and Bots 26.6 Recommended Reading 26.7 Key Terms, Review Questions, and Problems Chapter 27 Computer and Network Security Techniques 27.1 Virtual Private Networks and IPsec 27.2 SSL and TLS 27.3 Wi-Fi Protected Access 27.4 Intrusion Detection 27.5 Firewalls 27.6 Malware Defense 27.7 Recommended Reading 27.8 Key Terms, Review Questions, and Problems Appendix C Standards Organizations Appendix D Asynchronous and Synchronous TransmissionAppendix E The OSI Model Appendix F The International Reference Alphabet Appendix G Proof of the Sampling Theorem Appendix H Ones Complement Representation and AdditionAppendix I Statistical TDM Appendix J The Spanning Tree AlgorithmAppendix K LAN Performance IssuesAppendix L Matrix Multiplication and Determinants Appendix M Queuing Effects Appendix N Orthogonality, Correlation, and…”
Click Here to View Status and Holdings.
Manuscript Book -
771
Distributed Systems An Algorithmic Approach
Published 2007Click Here to View Status and Holdings.
Book -
772
-
773
-
774
-
775
-
776
-
777
-
778
-
779
-
780