Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Every aspect of business is impacted by design—from the products or services a company provides, to the various forms of communications that express these products and services, to the many environments, physical or virtual, where customers interact with these offerings. Graphic design can captivate, persuade, motivate, and delight....
Scala Design Patterns: Patterns for Practical Reuse and Design
Scala Design Patterns: Patterns for Practical Reuse and Design

Scala is a new and exciting programming language that is a hybrid between object oriented languages such as Java and functional languages such as Haskell. As such it has its own programming idioms and development styles.

Scala Design Patterns looks at how code reuse can be successfully achieved in Scala. A major aspect of...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

The Evolution of Violence (Evolutionary Psychology)
The Evolution of Violence (Evolutionary Psychology)

This volume is an interdisciplinary exploration of our understanding of the causes and consequences of violence. Represented in its chapters are noted scholars from a variety of fields including psychology, anthropology, law, and literature. The contributions reflect a broad scope of inquiry and diverse levels of analysis. With an underlying...

Applications of Graph Transformations with Industrial Relevance: Second International Workshop, AGTIVE 2003, Charlottesville
Applications of Graph Transformations with Industrial Relevance: Second International Workshop, AGTIVE 2003, Charlottesville
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Applications of Graph Transformations with Industrial Relevance, AGTIVE 2003, held in Charlotesville, Virginia, USA in September/October 2003.

The 27 revised full papers and 11 revised demo papers presented together with 2 invited papers and 5...

Joomla! E-Commerce with VirtueMart
Joomla! E-Commerce with VirtueMart
VirtueMart is a widely used component for adding e-commerce to a Joomla! site. VirtueMart covers all the aspects of e-commerce in an easy-to-use fashion and allows administrators to configure the various factors such as those of the shop, selling workflow, payment, products, and more. It also has many other features, which include managing...
Haptic Human-Computer Interaction
Haptic Human-Computer Interaction

Haptic devices allow users to feel their interfaces and interactions. This has the potential to radically change the way we use computers. Haptic interaction is interaction related to the sense of touch. This could be based on force-feedback or tactile devices. We can take advantage of our powerful sense of touch as an alternative...

Effective Customer Care: Understand Needs, Improve Service, Build Relationships (Sunday Times Creating Success)
Effective Customer Care: Understand Needs, Improve Service, Build Relationships (Sunday Times Creating Success)

Effective Customer Care is an essential guide to creating excellent customer service that will not only satisfy your customers and prompt orders, but also cement customer relationships and develop loyalty...and thus increase profits.

The book covers every aspect of the customer care process including how to: find...

Microsoft Windows Security Resource Kit
Microsoft Windows Security Resource Kit

Welcome to the Microsoft Windows Security Resource Kit. This book provides detailed information about security features in Microsoft Windows 2000 and Microsoft Windows XP and explains how to better secure computers running these operating systems. This book also provides information on managing security and privacy on...

jQuery Plugin Development Beginner's Guide
jQuery Plugin Development Beginner's Guide

jQuery is the most famous JavaScript library. If you use jQuery a lot, it may be a good idea to start packaging your code into plugins. A jQuery plugin is simply a way to put your code into a package, which makes it easier to maintain your code and use it across different projects. Although basic scripting is relatively straightforward,...

unlimited object storage image
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy