Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Efficient Structures for Geometric Data Management (Lecture Notes in Computer Science)
Efficient Structures for Geometric Data Management (Lecture Notes in Computer Science)

This book is the revised and extended version of a Pfr.D. dissertation submitted to the Department of Electrical Engineering and Computer Sciences, University of California at Berkeley. Many of the ideas presented in this book have their roots in discussions with Eugene Wong, my mentor and thesis advisor. I would like to thank Gene...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Trends in Functional Programming: 11th International Symposium, TFP 2010
Trends in Functional Programming: 11th International Symposium, TFP 2010

The 11th Symposium on Trends in Functional Programming took place on the University of Oklahoma campus in Norman, Oklahoma, May 17-19, 2010. The program included presentations of 26 papers submitted by researchers from six nations and an invited talk by J. Strother Moore on machine reasoning so well received that the question/answer...

Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)

Stable and dependable IT services and infrastructures are nowadays of paramount importance not only for modern enterprises but also for home users. However, as distributed information infrastructures continue to spread and grow, resulting in Internet-based, wireless and mobile systems, traditional solutions for managing and...

System Center Service Manager 2010 Unleashed
System Center Service Manager 2010 Unleashed

Service Manager 2010 is without a doubt the most customizable and extensible product in the System Center suite. The ability to customize and extend the product is enabled by the common technology platform born in Operations Manager that now underlies other Microsoft products such as System Center Essentials, Windows InTune, Virtual...

Literate Programming (Center for the Study of Language and Information - Lecture Notes)
Literate Programming (Center for the Study of Language and Information - Lecture Notes)

Computer programs arc fun to write, and well-written computer pro grams are fun to read. One of life's greatest pleasures can be the composition of a computer program that you know will be a pleasure for other people to read, and for yourself to read.

Computer programs can also do useful work. One of life's greatest...

E-Mail Marketing For Dummies (Business & Personal Finance)
E-Mail Marketing For Dummies (Business & Personal Finance)

E-mail isn’t a new technology any more, but you can do a lot of new things with e-mail marketing. E-mail can be delivered to mobile devices and can integrate nicely into a social media marketing strategy.

Still, the same challenges that existed in the past apply to the new world of e-mail marketing. Namely,...

The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Expert Resumes for Computer and Web Jobs, 3rd Ed
Expert Resumes for Computer and Web Jobs, 3rd Ed

Job search and career management become remarkably more complex and more competitive with each passing year. One major contributor to the new complexity is technology itself, which has created entirely new methods and systems for job search, recruitment, hiring, and lifelong career development.

Fortunately, this new...

Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)
Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)

Written by four experienced Nokia Telecommunications software developers, this practical book focuses on object-based and component-based software development. The authors concentrate on the most important issues in real-life software development, such as the development process itself, software architecture, the development of user...

Result Page: 566 565 564 563 562 561 560 559 558 557 556 555 554 553 552 551 550 549 548 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy