Home | Amazing | Today | Tags | Publishers | Years | Search 
QuickBooks 2013: The Missing Manual: The Official Intuit Guide to QuickBooks 2013
QuickBooks 2013: The Missing Manual: The Official Intuit Guide to QuickBooks 2013

Thousands of small companies and nonprofit organizations turn to QuickBooks to keep their finances on track. And over the years, Intuit has introduced various editions of the program to satisfy the needs of different types of companies. Back when milk was simply milk, you either used QuickBooks or you didn’t. But now, when you...

AAA Identity Management Security (Networking Technology: Security)
AAA Identity Management Security (Networking Technology: Security)

This book is focused on providing the skills necessary to successfully configure authentication, authorization, and accounting (AAA) services on Cisco devices using Cisco Secure Access Control Server/System 4.2 and 5.1. This book was motivated by a desire to provide a one-stop resource for AAA solutions on Cisco...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Effective Pricing with SAP ERP
Effective Pricing with SAP ERP
Pricing is a complicated subject and is used in several functionalities, including Sales and Distribution (SD) and Materials Management (MM). Currently no book in the market specifically focuses on pricing. We decided to write a book that addresses pricing not only in SD but also in MM to enable you to learn pricing applications...
History of Jewish Philosophy (Routledge History of World Philosophies)
History of Jewish Philosophy (Routledge History of World Philosophies)
This volume is planned as a companion to the Routledge History of Islamic Philosophy, and both take their place in the Routledge History of World Philosophies, a series designed to supplement and amplify the Routledge History of Philosophy. The idea of placing histories of Islamic and Jewish philosophy in such close proximity to a...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Python for Data Analysis
Python for Data Analysis

The scientific Python ecosystem of open source libraries has grown substantially over the last 10 years. By late 2011, I had long felt that the lack of centralized learning resources for data analysis and statistical applications was a stumbling block for new Python programmers engaged in such work. Key projects for data...

Microsoft System Center 2012 Endpoint Protection Cookbook
Microsoft System Center 2012 Endpoint Protection Cookbook
System Center 2012 Endpoint Protection (SCEP) is Microsoft's third-generation corporate anti-malware solution. At the core, it shares many similarities with their "free for home use" anti-malware product, Microsoft Security Essentials, which has been installed on over 50 million PCs the world over.

...
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had become humble and weak, while the feudal lords used their energies in attacking [one another]. The Southern Yi and Northern Ti engaged the Central States in battle, and the continued existence of the Central States seemed [to hang by] a thin thread...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Web Workers: Multithreaded Programs in JavaScript
Web Workers: Multithreaded Programs in JavaScript
Web Workers is a powerful feature of HTML5 that hasn’t received very much attention. It provides an API that allows you to run JavaScript in a separate thread that doesn’t interfere with the user interface of your web application. This JavaScript runs in parallel with the main renderer and any of your...
Models in Spatial Analysis (ISTE)
Models in Spatial Analysis (ISTE)
This book offers a relatively large overview of modeling families which exist in spatial analysis and of the different mindsets that went into them. Models presented are related to space organization principles, localization logic, the form of spatial interactions1 and their role in space dynamics. The expertise of the authors is...
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy