Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Quantitative MRI of the Brain: Measuring Changes Caused by Disease
Quantitative MRI of the Brain: Measuring Changes Caused by Disease

This book was conceived one balmy March evening on the banks of the river Brisbane, in Queensland, Australia, where I had just arrived for a sabbatical, and it became clear that the traditions of measurement science and MRI should meet. The notion of a guide, a cook-book, for quantitative MRI (qMR) techniques took seed, and attained its own...

Digital Identity
Digital Identity

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval...

CodeNotes for J2EE: EJB, JDBC, JSP, and Servlets
CodeNotes for J2EE: EJB, JDBC, JSP, and Servlets
CodeNotes provides the most succinct, accurate, and speedy way for a developer to ramp up on a new technology or language. Unlike other programming books, CodeNotes drills down to the core aspects of a technology, focusing on the key elements needed in order to understand it quickly and implement it immediately. It...
Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications
Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications
"...excellent and interesting reading for digital signal processing engineers and designers and for postgraduate students in electrical and computer faculties." (Mathematical Reviews, 2002d)

Signal Analysis explores methods that offer an insight into the properties of signals and stochastic processes. This
...
The World of Private Banking (Studies in Banking and Financial History)
The World of Private Banking (Studies in Banking and Financial History)

This is a full and authoritative account of the history of private banking, beginning with its development in conjunction with the world markets served by and centred on a few European cities, notably Amsterdam and London. These banks were usually partnerships, a form of organization which persisted as the role of private banking changed in...

The Bank Analyst's Handbook: Money, Risk and Conjuring Tricks
The Bank Analyst's Handbook: Money, Risk and Conjuring Tricks
Financial institutions have few friends. However, despite their poor image, they provide a range of services without which it is difficult to envisage how a modern economy could operate. It is also true that banks attract some of the brightest and most highly qualified people of any industry. Money is one factor, banks pay well for top talent, but...
Access to Financial Services in Brazil
Access to Financial Services in Brazil
There has been a growing awareness worldwide that financial exclusion reduces the potential welfare of individuals and the productivity of enterprises in an economy. This study focuses on the delivery of financial services to one of the world’s most important emerging financial markets, Brazil.

Despite concerns regarding diminishing bank...

CCNP BCRAN Exam Cram 2 (642-821)
CCNP BCRAN Exam Cram 2 (642-821)
Your resource to passing the Cisco CCNP BCRAN Certification Exam!

Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCNP BCRAN Exam Cram 2 (Exam 642-821) is focused on what you need to know to pass the CCNP BCRAN exam. The Exam Cram 2 Method of Study provides you...

RFID Applied
RFID Applied
Everything you need to know to implement and fully leverage RFID technology

RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system.

...
Designing and Conducting Business Surveys (Wiley Series in Survey Methodology)
Designing and Conducting Business Surveys (Wiley Series in Survey Methodology)

Designing and Conducting Business Surveys provides a coherent overview of the business survey process, from start to finish. It uniquely integrates an understanding of how businesses operate, a total survey error approach to data quality that focuses specifically on business surveys, and sound project management principles. The book...

Recruiting on the Web : Smart Strategies for Finding the Perfect Candidate
Recruiting on the Web : Smart Strategies for Finding the Perfect Candidate

Praise For Michael Foster's company, AIRS:

"FLIPPING. PEELING. X-RAYING. Sounds like what chefs and radiologists do, right? These are also some of the ingenious tricks executive headhunters use in the age of digital resumes and electronic job searches. AIRS is one of a few firms at the forefront of the burgeoning...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy