Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Serious Performance Consulting According to Rummler
Serious Performance Consulting According to Rummler

Praise for Serious Performance Consulting According to Rummler

"Before there was 'lean,' before there was TQM, before there was knowledge management, and before there were any one-minute cures, there was Geary Rummler preaching and practicing performance technology. With Serious...

Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Cornea and External Eye Disease: Corneal Allotransplantation, Allergic Disease and Trachoma (Essentials in Ophthalmology)
Cornea and External Eye Disease: Corneal Allotransplantation, Allergic Disease and Trachoma (Essentials in Ophthalmology)
The second volume covers a broad range of conjunctival and corneal diseases, again with particular emphasis being placed on problem management.

Various new surgical approaches are currently being evaluated in the clinical setting, an example of which is posterior lamellar keratoplasty in Fuchs endothelial
...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Variations in Economic Analysis: Essays in Honor of Eli Schwartz
Variations in Economic Analysis: Essays in Honor of Eli Schwartz

For over fifty years, Eli Schwartz has inspired generations of economists through his prolific publications and dedicated in teaching. In 2008, the Martindale Center for the Study of Private Enterprise at Lehigh University invited prominent academics and practitioners—including Nobel Prize recipients, Robert Solow and Harry Markowitz, and...

Investment Banking: A Guide to Underwriting and Advisory Services
Investment Banking: A Guide to Underwriting and Advisory Services

The recent financial turmoil has raised suspects on investment banks and will certainly reshape the industry. However, the transactions traditionally managed by investment banks will still require the intervention of financial institutions, as always in the past. This book aims at providing an overview of these traditional investment banking...

Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
In late 1999, a Republican congressman held a party in Washington
to celebrate the passing of new legislation destined to
have a profound effect on Wall Street and the entire financial
industry in the United States. Despite the date on the law,
the principle upon which it was based actually had been a cornerstone
of the
...
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy