This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
As visual design technology and tools become more accessible and widely used, it is important for digital artists to learn and apply fundamental design techniques to their work. Visual Design Fundamentals: A Digital Approach, Third Edition provides a basic understanding of design and how it should be integrated into digitally-produced 2D images....
One-of-a-kind guide from Microsoft insiders on Virtual Machine Manager 2008 R2!
What better way to learn VMM 2008 R2 than from the high-powered Microsoft program managers themselves? This stellar author team takes you under the hood of VMM 2008 R2, providing intermediate and advanced coverage of all features.
Delve inside the core SQL Server engine—and put that knowledge to work—with guidance from a team of well-known internals experts. Whether database developer, architect, or administrator, you’ll gain the deep knowledge you need to exploit key architectural changes—and capture the product’s full potential.
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have...
Substate nationalism, especially in the past fifteen years, has noticeably affected the political and territorial stability of many countries, both democratic and democratizing. Norms exist to limit the behavior of collective agents in relation to individuals; the set of universally accepted human rights provides a basic framework. There is a...
This Preface and the entire book are a little bit different—and that is by design. Both authors wrote this book understanding that our target audience often does not have time to read a whole book, or the Oracle documentation, from cover to cover. As such, we wrote this book with the idea that the table of contents and headings should tell...
A Breakthrough Framework for Adaptive Project Management from Project Management Guru Robert K. Wysocki
For an increasing number of critical projects, traditional project management models simply are not appropriate. In many cases, complete requirements...
Microsoft is introducing a large number of changes to the way that the .NET Framework operates. Familiar technologies are being altered, best practices replaced, and developer methodologies adjusted. Many developers find it hard to keep up with the pace of change across .NET's ever-widening array of technologies. You may know what's happening in...
The book gives an introduction to computer-based modelling of oceanic processes. It is the first of its kind and contains over twenty practical exercises, using freely available Open-Source software, and covers a wide range of topics from long surface waves, geostrophic flows, through to the general wind-driven circulation including western...
SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...
“We need men who can dream of things that never were.” It is this sentence spoken by John Fitzgerald Kennedy in 1963 which has undoubtedly influenced my industrial career. Whether it be everyday electronics for the general public, or the components industry or even the world of video and imagery, the technological innovations which...