 |
|
 Forensic Science: Fundamentals and Investigations
Finally, a textbook that provides the science behind forensics, as well as labs and activities appropriate
for high school students! Forensic Science: Fundamentals and Investigations is student and
teacher friendly. Teachers can conduct a full-year’s study of forensics or select topics that can
be incorporated into a... |  |  |  |  Systems Analysis and Design (Shelly Cashman)
The Shelly Cashman Series® offers the finest textbooks in computer education. We are
proud that our previous editions of Systems Analysis and Design have been so well
received by instructors and students. Systems Analysis and Design, Ninth Edition
continues with the innovation, quality, and reliability you have come to expect... |
|
 Calculus: Early Transcendentals
Calculus has a deservedly central role in higher education. It is not only the key to the full range of scientific and engineering disciplines; it is also a crucial component in a student’s intellectual development. I hope my text will help to open up this multifaceted world of ideas for the student. Like a great ... |  |  Blender Game Engine: Beginner's Guide
Blender Game Engine is the part of the Blender 3D editor used to create actual 3D video games. It's the ideal entry level game development environment because you don't even need to learn to program. Create a complete game using Bender's innovative logic bricks.
"Blender Game Engine: Beginner's Guide" is... |  |  Beginning Windows 8 Application Development (Wrox Programmer to Programmer)
DURING ITS 27 YEARS OF LIFE, Windows has undergone several big changes. Without a doubt, both users and developers perceive a big leap from Windows 7 to Windows 8! When Microsoft began development of the newest Windows version, it totally re-imagined the operating system. Instead of patching the previous versions and just adding new or... |
|
|
 Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |  |  Web Application Security, A Beginner's Guide
Security Smarts for the Self-Guided IT Professional
“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting... |  |  SQL Server 2012 Integration Services Design Patterns
For me, one of the great pleasures of working at Microsoft was shepherding new products from concept to release. However, it was even more fulfilling to witness the birth and growth of new communities of users, for what is a product without a user? Just bits and bytes on a disk. In my role as Group Product Manager of the SQL Server Integration... |
|
Result Page: 582 581 580 579 578 577 576 575 574 573 572 |