Home | Amazing | Today | Tags | Publishers | Years | Search 
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Microsoft System Center 2012 Orchestrator Cookbook
Microsoft System Center 2012 Orchestrator Cookbook

Automate mission-critical tasks with this practical, real-world guide to System Center 2012 Orchestrator

Overview

  • Create powerful runbooks for the entire System Center 2012 product line
  • Master System Center 2012 to create advanced runbooks
  • Learn how to install System Center...
Starling Game Development Essentials
Starling Game Development Essentials

Develop and deploy isometric turn-based games using Starling

Overview

  • Create a cross-platform Starling Isometric game
  • Add enemy AI and multiplayer capability
  • Explore the complete source code for the Web and cross-platform game develpment

In...

501 Killer Marketing Tactics to Increase Sales, Maximize Profits, and Stomp Your Competition: Revised and Expanded Second Edition
501 Killer Marketing Tactics to Increase Sales, Maximize Profits, and Stomp Your Competition: Revised and Expanded Second Edition

Bigger, Badder, Better!
ATTACK OF THE KILLER MARKETING TACTICS!

A few years back, marketing super-guru Tom Feltenstein in rewrote the book on high-impact marketing that works. Fast-forward to today and new technologies, more sophisticated consumers/competitors, and a whole new media...

PhoneGap for Enterprise
PhoneGap for Enterprise

Master the art of building secure enterprise mobile applications using PhoneGap

About This Book

  • Learn how to build secure mobile enterprise apps from scratch using PhoneGap
  • Understand PhoneGap's framework, including common issues and their resolutions, and become the go-to person in...
Java Security (Java Series)
Java Security (Java Series)

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with...

Financial Freedom: A Guide to Achieving Lifelong Wealth and Security
Financial Freedom: A Guide to Achieving Lifelong Wealth and Security

If you're one of the millions of Americans who is buried in credit card debt, or maybe you're having trouble deciphering the fine print on your 401(K)—that is, if you even have a 401(K)!—don't dismay. You can start taking steps toward closing your financial illiteracy gap right away with the sound, practical personal...

Principles and Practice of Pharmaceutical Medicine
Principles and Practice of Pharmaceutical Medicine
Since the first edition of this book, pharmaceutical medicine has only become more diverse and has also become widely accepted as a recognized medical specialty, for example, with its first graduates of specialist training in the United Kingdom, to add to those of Switzerland, and Mexico. This has been accompanied by pharmaceutical...
Developing Secure Applications with Visual Basic
Developing Secure Applications with Visual Basic

Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own...

FreeSWITCH 1.6 Cookbook
FreeSWITCH 1.6 Cookbook

Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features

About This Book

  • Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
  • Trap all the common functionalities of the telephony platform using popular communication protocols
  • ...
iOS 7 Game Development
iOS 7 Game Development

Develop powerful, engaging games with readytouse utilities from Sprite Kit

About This Book

  • Pen your own endless runner game using Apple's new Sprite Kit framework
  • Enhance your user experience with easy-to-use animations and particle effects using Xcode 5
  • Utilize...
Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy