|
|
|
|
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to... | | Quantitative MRI of the Brain: Measuring Changes Caused by Disease
This book was conceived one balmy March evening on the banks of the river Brisbane, in Queensland, Australia, where I had just arrived for a sabbatical, and it became clear that the traditions of measurement science and MRI should meet. The notion of a guide, a cook-book, for quantitative MRI (qMR) techniques took seed, and attained its own... | | Digital IdentityThe rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval... |
|
CodeNotes for J2EE: EJB, JDBC, JSP, and ServletsCodeNotes provides the most succinct, accurate, and speedy way for a developer to ramp up on a new technology or language. Unlike other programming books, CodeNotes drills down to the core aspects of a technology, focusing on the key elements needed in order to understand it quickly and implement it immediately. It... | | | | The World of Private Banking (Studies in Banking and Financial History)This is a full and authoritative account of the history of private banking, beginning with its development in conjunction with the world markets served by and centred on a few European cities, notably Amsterdam and London. These banks were usually partnerships, a form of organization which persisted as the role of private banking changed in... |
|
|
RFID AppliedEverything you need to know to implement and fully leverage RFID technology
RFID Applied is just that—the application of radio-frequency identification (RFID) technology. The book discusses both the technical and the business issues involved in selecting, developing, and implementing an RFID system. ... | | Designing and Conducting Business Surveys (Wiley Series in Survey Methodology)
Designing and Conducting Business Surveys provides a coherent overview of the business survey process, from start to finish. It uniquely integrates an understanding of how businesses operate, a total survey error approach to data quality that focuses specifically on business surveys, and sound project management principles. The book... | | Recruiting on the Web : Smart Strategies for Finding the Perfect CandidatePraise For Michael Foster's company, AIRS:
"FLIPPING. PEELING. X-RAYING. Sounds like what chefs and radiologists do, right? These are also some of the ingenious tricks executive headhunters use in the age of digital resumes and electronic job searches. AIRS is one of a few firms at the forefront of the burgeoning... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |