Home | Amazing | Today | Tags | Publishers | Years | Search 
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

Encyclopedia of Information Communication Technology
Encyclopedia of Information Communication Technology
The Encyclopedia of Information Communication Technology (ICT) is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies.

A reference point for studies...

Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
Brands That Rock: What Business Leaders Can Learn from the World of Rock and Roll
"Reading Brands That Rock is like attending business school, where classes on customer loyalty, consumer behavior, and branding are taught by Mick Jagger, Elton John, Steven Tyler, and Madonna."

–Tommy Hilfiger, Designer

Cadillac and The Rolling Stones. Victoria’s Secret and Madonna. Wal-Mart and...

Wireless Mesh Networking
Wireless Mesh Networking
A Complete Roadmap to Wireless Mesh Network Design Principles and Practices Using WiFi, WiMAX, and ZigBEE!

Wireless Mesh Networking provides everything needed to create in-demand wireless mesh networks that provide wireless broadband access over wide areas. This resource presents a complete roadmap to the design and...

Handbook of Granular Computing
Handbook of Granular Computing
Although the notion is a relatively recent one, the notions and principles of Granular Computing (GrC) have appeared in a different guise in many related fields including granularity in Artificial Intelligence, interval computing, cluster analysis, quotient space theory and many others. Recent years have witnessed a renewed and expanding interest...
Creating Web Sites Bible, Second Edition
Creating Web Sites Bible, Second Edition
Everything you need to build a great Web site ...

Whether you want to start an online store, establish a Web presence for a brick-and-mortar business, or just

show off your family album, this book shows you how. Even if you're fairly new to the Web world, you'll soon learn both the aesthetic and technical aspects of Web design....

Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
Handbook of Research on Wireless Multimedia: Quality of Service and Solutions
Handbook of Research on Wireless Multimedia: Quality of Service and Solutions
The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks.

The Handbook of Research on Wireless...

Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Digital piracy. It's a global war -- and it's just begun. Pirates of the Digital Millennium chronicles that war. All of it: media conglomerates vs. teenagers, tech companies vs. content providers, artists battling artists, nations vs. nations, law enforcement vs. organized crime. John Gantz and Jack Rochester cover every side and all the...
Selected Readings on Telecommunication and Networking (Premier Reference Source)
Selected Readings on Telecommunication and Networking (Premier Reference Source)
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements.

Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality chapters focused...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy