Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Forefront Identity Manager 2010 R2 Handbook
Microsoft Forefront Identity Manager 2010 R2 Handbook
Microsoft's Forefront Identity Manager simplifies enterprise Identity Management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems.

The Microsoft Forefront Identity Manager 2010 R2 Handbook is an in-depth guide to Identity Management.
...
Learning Quartz Composer: A Hands-On Guide to Creating Motion Graphics with Quartz Composer
Learning Quartz Composer: A Hands-On Guide to Creating Motion Graphics with Quartz Composer

 

Welcome to Learning Quartz Composer! We guarantee this will be the most fun geek book you have read, and by the end your digital world will be a better-looking place. Whether you dream of live visuals, interactive installations, Cocoa apps, dashboard widgets, or extra awesomeness for your film and motion...

Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Social Knowledge: Using Social Media to Know What You Know (Premier Reference Source)
Social Knowledge: Using Social Media to Know What You Know (Premier Reference Source)
Unlike many of the management movements of the last half century knowledge management has no single origin or unambiguous instantiation. Business Process Reengineering, the Balanced Score Card and the Learning Organisation (to mention but a few) all originate with a single book which then defines the field. In Knowledge Management...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Systems Analysis and Design in a Changing World (with Computing and Information Technology CourseMate Printed Access Card, Microsoft Project 2010 60 ... and Microsoft Visio 2010 60 Day Trial CD-ROM)
Systems Analysis and Design in a Changing World (with Computing and Information Technology CourseMate Printed Access Card, Microsoft Project 2010 60 ... and Microsoft Visio 2010 60 Day Trial CD-ROM)

Now readers can develop the solid conceptual, technical and managerial foundations needed for effective systems analysis design and implementation as well as the project management skills for systems development with SYSTEMS ANALYSIS AND DESIGN IN A CHANGING WORLD, 6E. This popular text teaches both the traditional (structured) and the...

Algorithms for Image Processing and Computer Vision
Algorithms for Image Processing and Computer Vision

Humans still obtain the vast majority of their sensory input through their visual system, and an enormous effort has been made to artificially enhance this sense. Eyeglasses, binoculars, telescopes, radar, infrared sensors, and photomultipliers all function to improve our view of the world and the universe. We even have telescopes in orbit...

High Commitment High Performance: How to Build A Resilient Organization for Sustained Advantage
High Commitment High Performance: How to Build A Resilient Organization for Sustained Advantage

"In these economic times this book is more important than ever. A must-read for the leaders of today and tomorrow."

Douglas R. Conant, president and chief executive officer, Campbell Soup Company

Praise for High Commitment, High Performance

"It is seldom that I read a book about leadership and...

Cardiovascular Disease, Volume 2: Molecular Medicine (Methods in Molecular Medicine)
Cardiovascular Disease, Volume 2: Molecular Medicine (Methods in Molecular Medicine)

Cardiovascular disease is the leading cause of death in developed countries, but is quickly becoming an epidemic in such well-populated countries as China, India, and other developing nations. Cardiovascular research is the key to the prevention, diagnosis, and management of cardiovascular disease. Vigorous and cross-disciplinary approaches...

Raspberry Pi: A Quick-Start Guide
Raspberry Pi: A Quick-Start Guide

Printed in full color.

Most of the book is targeted at beginners in computing and programming. A few parts, such as the small electronics project and setting up a web server, assume some intermediate skills.

The Raspberry Pi is one of the most successful open source hardware projects ever. For
...

IPython Interactive Computing and Visualization Cookbook
IPython Interactive Computing and Visualization Cookbook

Over 100 hands-on recipes to sharpen your skills in high-performance numerical computing and data science with Python

About This Book

  • Leverage the new features of the IPython notebook for interactive web-based big data analysis and visualization
  • Become an expert in high-performance...
Cut and Fold Techniques for Pop-Up Designs
Cut and Fold Techniques for Pop-Up Designs

Introducing techniques for making pop-ups from one sheet of card, the third title in this series on paper engineering takes folding techniques into the third dimension.

Each chapter introduces a new technical idea and show how that technique can be adapted in many different ways, or combined with techniques from earlier
...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy