Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
The Warren Buffett Way
The Warren Buffett Way

Warren Buffett is the most famous investor of all time and one of today’s most admired business leaders. He became a billionaire and investment sage by looking at companies as businesses rather than prices on a stock screen. The first two editions of The Warren Buffett Way gave investors their first in-depth look at the...

Behavioral Medicine:  A Guide for Clinical Practice, Third Edition
Behavioral Medicine: A Guide for Clinical Practice, Third Edition

5 STAR DOODY'S REVIEW!
"This is an extraordinarily thorough, useful book. It manages to summarize numerous topics, many of which are not a part of a traditional medical curriculum, in concise, relevant chapters. Physicians who do not understand the dynamics behind the doctor-patient relationship usually end up being
...

Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)

A comprehensive collection of cutting-edge methods to study and work with the vaccinia virus and other poxvirus gene transcriptions. These readily reproducible techniques can be used for the construction and characterization of recombinant viruses; for the study of poxvirus gene transcription and DNA replication; for the investigation of the...

Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python

Learn, understand, and implement deep neural networks in a math- and programming-friendly approach using Keras and Python. The book focuses on an end-to-end approach to developing supervised learning algorithms in regression and classification with practical business-centric use-cases implemented in Keras.

The overall...

The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
Learn and master the new features in the JSF 2.3 MVC web framework in this definitive guide written by two of the JavaServer Faces (JSF) specification leads. The authors take you through real-world examples that demonstrate how these new features are used with other APIs in Java EE 8. You’ll see the new and exciting ways...
Titanium Microalloyed Steel: Fundamentals, Technology, and Products
Titanium Microalloyed Steel: Fundamentals, Technology, and Products
This book comprehensively reviews the research on Ti microalloyed steel, focusing on development and production technology. It discusses steel composition design and performance, as well as technologies for controlling the microstructure and properties of Ti microalloyed steel during the production process. Ti can significantly improve...
Skip the Line: The 10,000 Experiments Rule and Other Surprising Advice for Reaching Your Goals
Skip the Line: The 10,000 Experiments Rule and Other Surprising Advice for Reaching Your Goals

The entrepreneur, angel investor, and bestselling author of Choose Yourself busts the 10,000-hour rule of achieving mastery, offering a new mindset and dozens of techniques that will inspire any professional—no matter their age or managerial level—to pursue their passions and quickly acquire the skills...

Microsoft Windows XP: Do Amazing Things!
Microsoft Windows XP: Do Amazing Things!

Who knows what cool things you could be doing right now with Windows XP? You do! So let’s go—it’s time to have some fun and amaze yourself with all you can do with your PC! This friendly, fast-paced guide highlights dozens of activities and experiences—and shares the straightforward how-to’s for trying everything...

CCNP Practical Studies: Remote Access (CCNP Self-Study)
CCNP Practical Studies: Remote Access (CCNP Self-Study)

Gain hands-on experience of CCNP Remote Access topics with lab scenarios for the new 642-821 BCRAN exam.

  • Prepare for the CCNP 642-821 BCRAN exam and gain a better, practical understanding of exam concepts

  • Experience how remote access...

Hibernate: A J2EE™ Developer's Guide
Hibernate: A J2EE™ Developer's Guide
Build fast, high-performance Java database applications with Hibernate.

Hibernate makes it far easier to build robust, high-performance database applications with Java. Now there's a practical, hands-on guide to using Hibernate's flexible, fast object/relational persistence and query services. Will Iverson covers every facet of...

unlimited object storage image
Result Page: 1385 1384 1383 1382 1381 1380 1379 1378 1377 1376 1375 1374 1373 1372 1371 1370 1369 1368 1367 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy