Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches....
Image Processing for Remote Sensing
Image Processing for Remote Sensing
Edited by leaders in the field, with contributions by a panel of experts, Image Processing for Remote Sensing explores new and unconventional mathematics methods. The coverage includes the physics and mathematical algorithms of SAR images, a comprehensive treatment of MRF-based remote sensing image classification, statistical...
A Concise Introduction to Software Engineering (Undergraduate Topics in Computer Science)
A Concise Introduction to Software Engineering (Undergraduate Topics in Computer Science)
Software engineering is an integral part of studies in computer science and consequently foundational knowledge is critical to all students in the field. This text focuses on the essential elements, providing readers with the basic skills and introductory knowledge required to execute a software project successfully.

Following the winning...

Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
The E-Learning Handbook: A Comprehensive Guide to Online Learning
The E-Learning Handbook: A Comprehensive Guide to Online Learning
The e-Learning Handbook provides a critical reflection on the current state of e-learning with contributions from the world's foremost e-learning experts and best-selling authors from academe and industry, including Margaret Driscoll, Brent Wilson, Lee Christopher, William Horton, L. Wayne Precht, Harvey Singh, Jim Everidge, Jane Bozarth, Pat...
MCTS 70-640 Exam Cram: Windows Server 2008 Active Directory, Configuring
MCTS 70-640 Exam Cram: Windows Server 2008 Active Directory, Configuring
Welcome to MCTS 70-640 Exam Cram: Windows Server 2008 Active Directory, Configuring. This book aims to help you get ready to take—and pass—Microsoft Certification Exam 70-640: TS: Windows Server 2008 Active Directory, Configuring. This book contains information to help ensure your success as you pursue this Microsoft exam and...
Essential Neurology
Essential Neurology

A brand new edition of Essential Neurology brings the text fully up-to-date. This book is a core text for medical students and junior doctors, who want a comprehensive yet concise practical guide to clinical neurology. To make the book more readable and digestible, we have introduced colour into the text. This text provides clear explanations of...

Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Analytical Techniques in the Sciences

This series of books provides coverage of all of the major analytical techniques and their application in the most important areas of physical, life and materials science. Each text is presented in an open learning/distance learning style, in which the learning objectives are clearly identified. The...

Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective optimization deals with solving problems having not only one, but multiple, often conflicting, criteria. Such problems can arise in practically every field of science, engineering and business, and the need for efficient and reliable solution methods is increasing. The task is challenging due to the fact that, instead of a single...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy