Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
"It's certainly a challenging read, but one that's worth spending some brain power on if you're keen to create a successful computer-based production company. Getting into such a competitive market means doing some research, and for aspiring imageers this is a great first step." - Advanced Photoshop

In situations
...
Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Solar Resources Mapping: Fundamentals and Applications (Green Energy and Technology)
Solar Resources Mapping: Fundamentals and Applications (Green Energy and Technology)
This book presents methods for optimising the spatial and network configuration of solar radiation measuring stations. Various physical and mathematical models are demonstrated, which together with high quality measurements, provide the essential tools to generate and validate solar resource estimates to improve the mapping of solar...
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
Computational Intelligence in Information Assurance and Security (Studies in Computational Intelligence)
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centers and military installations to name a few. Finding effective ways to protect...
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

Successful Software Development (2nd Edition)
Successful Software Development (2nd Edition)

A systematic approach to consistently successful software development.

In the age of the Internet, where software is more mission-critical than ever, it's no longer enough for your development projects to succeed some of the time. You need to deliver excellence, consistently—and you must do it faster than ever.

...

Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking)
Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking)
In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely...
Testing and Quality Assurance for Component-Based Software (Artech House Computer Library.)
Testing and Quality Assurance for Component-Based Software (Artech House Computer Library.)
The widespread development and reuse of software components is regarded
by many as one of the next biggest phenomena for software. Reusing
high-quality software components in software development has the potential
for drastically improving the quality and development productivity of
component-based software. However, the
...
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Managing Risk In Information Systems (Information Systems Security & Assurance Series)
Managing Risk In Information Systems (Information Systems Security & Assurance Series)

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery...

A Project Guide to UX Design: For user experience designers in the field or in the making (2nd Edition)
A Project Guide to UX Design: For user experience designers in the field or in the making (2nd Edition)

User experience design is the discipline of creating a useful and usable Web site or application that’s easily navigated and meets the needs of the site owner and its users. There’s a lot more to successful UX design than knowing the latest Web technologies or design trends: It takes diplomacy, management skills, and business...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy