Home | Amazing | Today | Tags | Publishers | Years | Search 
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
Visual Design Fundamentals: A Digital Approach
Visual Design Fundamentals: A Digital Approach

As visual design technology and tools become more accessible and widely used, it is important for digital artists to learn and apply fundamental design techniques to their work. Visual Design Fundamentals: A Digital Approach, Third Edition provides a basic understanding of design and how it should be integrated into digitally-produced 2D images....

Mastering Virtual Machine Manager 2008 R2
Mastering Virtual Machine Manager 2008 R2

One-of-a-kind guide from Microsoft insiders on Virtual Machine Manager 2008 R2!

What better way to learn VMM 2008 R2 than from the high-powered Microsoft program managers themselves? This stellar author team takes you under the hood of VMM 2008 R2, providing intermediate and advanced coverage of all features.

Microsoft SQL Server 2008 Internals (Pro - Developer)
Microsoft SQL Server 2008 Internals (Pro - Developer)

Delve inside the core SQL Server engine—and put that knowledge to work—with guidance from a team of well-known internals experts. Whether database developer, architect, or administrator, you’ll gain the deep knowledge you need to exploit key architectural changes—and capture the product’s full potential.

...
Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have
...

National Self-Determination and Justice in Multinational States (Studies in Global Justice)
National Self-Determination and Justice in Multinational States (Studies in Global Justice)

Substate nationalism, especially in the past fifteen years, has noticeably affected the political and territorial stability of many countries, both democratic and democratizing. Norms exist to limit the behavior of collective agents in relation to individuals; the set of universally accepted human rights provides a basic framework. There is a...

Oracle 11g Streams Implementer's Guide
Oracle 11g Streams Implementer's Guide

This Preface and the entire book are a little bit different—and that is by design. Both authors wrote this book understanding that our target audience often does not have time to read a whole book, or the Oracle documentation, from cover to cover. As such, we wrote this book with the idea that the table of contents and headings should tell...

Adaptive Project Framework: Managing Complexity in the Face of Uncertainty
Adaptive Project Framework: Managing Complexity in the Face of Uncertainty

A Breakthrough Framework for Adaptive Project Management from Project Management Guru Robert K. Wysocki

 

For an increasing number of critical projects, traditional project management models simply are not appropriate. In many cases, complete requirements...

Introducing .NET 4.0: with Visual Studio 2010 (Expert's Voice in .Net)
Introducing .NET 4.0: with Visual Studio 2010 (Expert's Voice in .Net)

Microsoft is introducing a large number of changes to the way that the .NET Framework operates. Familiar technologies are being altered, best practices replaced, and developer methodologies adjusted. Many developers find it hard to keep up with the pace of change across .NET's ever-widening array of technologies. You may know what's happening in...

Ocean Modelling for Beginners: Using Open-Source Software
Ocean Modelling for Beginners: Using Open-Source Software

The book gives an introduction to computer-based modelling of oceanic processes. It is the first of its kind and contains over twenty practical exercises, using freely available Open-Source software, and covers a wide range of topics from long surface waves, geostrophic flows, through to the general wind-driven circulation including western...

Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

Nanocomputers and Swarm Intelligence
Nanocomputers and Swarm Intelligence

“We need men who can dream of things that never were.” It is this sentence spoken by John Fitzgerald Kennedy in 1963 which has undoubtedly influenced my industrial career. Whether it be everyday electronics for the general public, or the components industry or even the world of video and imagery, the technological innovations which...

Result Page: 1449 1448 1447 1446 1445 1444 1443 1442 1441 1440 1439 1438 1437 1436 1435 1434 1433 1432 1431 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy