Home | Amazing | Today | Tags | Publishers | Years | Search 
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Electronic Circuits - Fundamentals & Applications, Third Edition
Electronic Circuits - Fundamentals & Applications, Third Edition

Electronic Circuits is a unique combination of a comprehensive reference text and a practical electronics handbook in one volume.

Mike Tooley provides all the essential information required to get to grips with the fundamentals of electronics, detailing the underpinning knowledge
...

Death Scene Investigation: A Field Guide
Death Scene Investigation: A Field Guide
Each and every death scene presents new challenges to even the most seasoned professional. This handy field guide provides easy direction for the death scene investigator. Organized in an accessible outline format, it covers protocols and guidelines, assessment and examination, medical history and records, and autopsy and death certificates....
Zen Cart: E-commerce Application Development: A step-by-step developer's guide
Zen Cart: E-commerce Application Development: A step-by-step developer's guide

Zen Cart is a popular open-source PHP/MySQL-based e-commerce solution available under GPL that is designed to put the merchants' and shoppers' requirements first. Not only does Zen Cart offer a very long list of features, but the system is designed with both store owners and web developers in mind. There's no sacrifice of usability or power.

...
Oracle 10g/11g Data and Database Management Utilities
Oracle 10g/11g Data and Database Management Utilities

Does your database look complicated? Are you finding it difficult to interact with it? Database interaction is a part of the daily routine for all database professionals. Using Oracle Utilities the user can benefit from improved maintenance windows, optimized backups, faster data transfers, and more reliable security and in general can do...

Pounder's Marine Diesel Engines and Gas Turbines, Ninth Edition
Pounder's Marine Diesel Engines and Gas Turbines, Ninth Edition
Since its first appearance in 1950, Pounder's Marine Diesel Engines has served seagoing engineers, students of the Certificates of Competency examinations and the marine engineering industry throughout the world. Each new edition has noted the changes in engine design and the influence of new technology and economic needs on the marine...
Mastering Network Security
Mastering Network Security
The new edition of the highly-acclaimed and best-selling Mastering Network Security is here, and just in time! The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security...
Microsoft Lync Server 2010 Unleashed
Microsoft Lync Server 2010 Unleashed

This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Software Testing: An ISTQB-ISEB Foundation Guide
Software Testing: An ISTQB-ISEB Foundation Guide

The Information Systems Examination Board (ISEB) of BCS (www.bcs.org.uk/iseb) instigated the Foundation Certificate in Software Testing in 1998; since then over 40,000 Foundation Certificates have been awarded. An intermediate level qualification was introduced in 2007 as a step towards the more advanced Practitioner...

Reflectarray Antennas
Reflectarray Antennas
Describes the configuration and principles of a reflectarray antenna, its advantages over other antennas, the history of its development, analysis techniques, practical design procedures, bandwidth issues and wideband techniques, as well as applications and recent developments. Both authors are well respected practitioners who have build these...
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy