 |
|
|
 Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  A Guide to MATLAB: For Beginners and Experienced Users
That statement encapsulates the view of The MathWorks, Inc., the developer of
MATLAB®. MATLAB 6 is an ambitious program. It contains hundreds of com-
mands to do mathematics. You can use it to graph functions, solve equations,
perform statistical tests, and do much more. It is a high-level programming
language that can communicate... |  |  Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological... |
|
|
 The iMovie '11 Project Book
I love that I’ve been able to write a book about projects in iMovie.
Editing video, after all, is a project in many ways. It often requires a
good deal of time and attention to detail. It’s something you elect to
do, probably in your spare time, because you want to document
what happened at an event, or preserve memories,... |  |  |  |  Web Design for ROI: Turning Browsers into Buyers & Prospects into Leads
This book is a child borne, like many others, of a cosmic combination of
passion, frustration, experience, and luck.
Passion—we quite simply love what we do and care deeply about the results. We hope we’re able to
communicate this in our writing.
Frustration—it seems for every victory we gain with... |
|
| Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |