Methods Of Undetected Suicide
Very easy to study and grasp four diagnostic methods of TCM. Writer combines rich clinical experiences with teaching, edit this book with form of outline. Book has 38 charts, 30 pulse flash, 167 colorful pictures of tongue.
|License: Shareware||Cost: $28.00 USD||Size: 8.18 MB||Download (88): Four Diagnostic Methods of TCM Download|
Paranamer is a mechamism that allows Java programmers to access the parameter names of methods of Java classes. The project works with JDK 1.4 and later..
|License: Freeware||Size: 22.53 KB||Download (75): Paranamer 1.0 Download|
Dinapter automatically generates a mapping between methods of incompatible components based on their public interfaces and behaviors. It uses a combination of expert system and A* algorithm. Based on A. Brogi, C. Canal and E. Pimentel papers.
Platforms: Windows, Mac, Linux
|License: Freeware||Size: 2.83 MB||Download (27): Specification of Behavioral Adapters Download|
The TOSTER is a system for sharing a set of tools that allow to implement methods of object-oriented testing. Any method based on UML diagrams and on the software source code can easily be implemented as a TOSTER module. The environment itself makes a num
|License: Freeware||Size: 1.04 MB||Download (19): Toster Download|
The IASLC Atlas of ALK Testing in Lung Cancer app is a resource designed to help pathologists, laboratory scientists, and practicing physicians better understand various methods of anaplastic lymphoma kinase (ALK) testing and the interpretation of test results. This Atlas app defines the...
|License: Shareware||Cost: $4.99 USD||Size: 15.6 MB||Download (7): IASLC Atlas of ALK Testing in Lung Cancer Download|
ZipRecovery is a data recovery program for corrupted Zip archives (.ZIP). Unfortunately, bad floppies and corrupted file systems pop up and scramble .ZIP archives at the worst possible times. Everybody knows the sinking feeling of discovering that an important archive has been corrupted. When...
|License: Demo||Cost: $149.00 USD||Size: 2.49 MB||Download (116): ZipRecovery Download|
Keep a journal offline with optional password protection using the same encryption method used for U.S. government classified documents. You can import from existing blogs and export to many formats including a blog saved on your computer with the option to send it online or email it to only...
|License: Shareware||Cost: $24.95 USD||Size: 6.25 MB||Download (141): Xml Journal System for Windows Download|
MAPILab Groupware Server is a great alternative to the traditional methods of Outlook sharing. By far the biggest advantage of using this software is that it is far cheaper than the traditional methods, and about a sixth of the price depending on the size of your organization. MAPILab Groupware...
|License: Shareware||Cost: $49.00 USD||Size: 4.02 MB||Download (120): MAPILab Groupware Server Download|
How to Teach Drayton and Naomi explore the psychological basis for learning and provide insight into how one can apply these rules to impart knowledge to others. In no technical terms, it shows the various methods of teaching, the learning processes and how to measure achievement in children....
|License: Shareware||Cost: $19.95 USD||Size: 424 KB||Download (143): How To Teach Download|
Copysafe Web is the most secure solution available to copy protect web pages and images from all methods of copy (including Printscreen and screen capture). Copysafe Web includes all of the features found in Secure Image plus the Copysafe Web plugin to trap capture methods. Copysafe Web images...
Platforms: Windows, Mac, *nix
|License: Commercial||Cost: $500.00 USD||Size: 2.61 MB||Download (126): Copysafe Web Download|
Traditional methods of creating a timeline involve manual processes. This means a high investment in time and cost to build one static timeline. If a need arises to make adjustments to the timeline, whether to add events, adjust times/dates or to correct mistakes, then the process must be...
|License: Demo||Cost: $195.00 USD||Size: 16 MB||Download (248): Timeline Maker Professional Download|
SWF Protector is ready to help you to protect your Flash developments codes from decompilers using 3 effective methods of protection that can mix or hide a code, obfuscate the variable names, feature names, etc. in a definite way. This powerful utility make a source code of your swf file...
|License: Shareware||Cost: $69.00 USD||Size: 4.61 MB||Download (84): DCoM SWF Protector Download|
iPod data retrieval utility is an easy to use, safe and non destructive tool having advance technology specially designed for recovery of undetected iPod files folders containing audio video songs, favorite music files mp3 mp4, m4a, m4b, m4v, aac, m4p) etc which were erased from your apple iPod...
|License: Shareware||Cost: $38.00 USD||Size: 573 KB||Download (81): 001Micron iPod Data Recovery Download|
We offer the courses of studies based on the traditional methods of young-aged children development. The computer games are created for 3-4-year-old children according to these methods. The course of studies Learning to move a mouse is destined for children to familiarize them with the computer...
|License: Shareware||Cost: $29.99 USD||Size: 4.08 KB||Download (73): Course kit 1 Flowers Download|
WBHost is an ActiveX control serving as a wrapper for the Microsoft WebBrowser control. WBHost inherits all events, properties and methods of the WebBrowser control and adds its own. It implements the methods of the IDocHostUIHandler, IDocHostUIHandler2 and IDocHostShowUI interfaces. Each method...
|License: Shareware||Cost: $54.00 USD||Size: 1.08 MB||Download (80): WBHost ActiveX Control Download|
PacketDB projects goal is to create a set of workflows that treat tcpdumps/packet captures as just another sort of data to be loaded into relational structures and manipulated using the well-established methods of relational databases. The real fun begins after the scripts run and you get to...
|License: Freeware||Size: 10.24 KB||Download (73): PacketDB Download|
Copysafe Web Protection is the most secure solution available to copy protect web pages and images from all methods of copy (including Printscreen and screen capture). Copysafe Web includes all of the features found in Secure Image plus the Copysafe Web plugin to trap capture methods. Copysafe...
|License: Demo||Cost: $500.00 USD||Size: 2.16 MB||Download (80): Copysafe Web Protection Download|
Comprehensive protection with the latest version of Integos network and malware security program, includes threat-detection techniques, improved methods of detection, combined detection protocols, proactive behavioral analysis, and a full range of defensive functions. VirusBarrier X6 protects...
|License: Freeware||Size: 34.6 MB||Download (45): VirusBarrier X6 for Mac OS Download|
Free download for PDF reader for copy protected PDF documents. CopySafe PDF was specially designed to protect PDF documents from all methods of copy and reproduction.
CopySafe PDF is the most secure solution for distributing copy protected PDF files and the only solution that can protect...
|License: Freeware||Size: 5.9 MB||Download (35): Copysafe PDF Reader Download|
Elyse is a file management system which solves the major problem with traditional methods of managing large numbers files on computers: paths and folders. Storing files in Elyse eliminates the need to decide precisely where to store a file, or to subsequently find where it was stored. Any logical...
|License: Freeware||Size: 26.6 MB||Download (31): Elyse for Mac Download|