Home | Amazing | Today | Tags | Publishers | Years | Search 
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

The Power of Business Process Improvement: 10 Simple Steps to Increase Effectiveness, Efficiency, and Adaptability
The Power of Business Process Improvement: 10 Simple Steps to Increase Effectiveness, Efficiency, and Adaptability

Every business process in every organization can be made better, more efficient, more flexible and more adaptable to changing needs. Business process improvement (BPI) can drive substantial bottom-line increases, ultimately accelerating the revenue cycle. "The Power of Business-Process Improvement" proves that even sweeping BPI...

Mac OS X and iOS Internals: To the Apple's Core (Wrox Programmer to Programmer)
Mac OS X and iOS Internals: To the Apple's Core (Wrox Programmer to Programmer)
EVEN MORE THAN TEN YEARS AFTER ITS INCEPTION, there is a dearth of books discussing the architecture of OS X, and virtually none about iOS. While there is plentiful documentation on Objective-C, the frameworks, and Cocoa APIs of OS X, it often stops short of the system-call level and implementation specifi cs. There is some...
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Machine vision – applications and systems
Machine vision – applications and systems

Vision plays a fundamental role for living beings by allowing them to interact with the environment in an effective and efficient way. The Machine Vision goal is to endow computing devices, and more generally artificial systems, with visual capabilities in order to cope with not a priori predetermined situations. To this end, we have to take...

Microsoft SQL Server 2012 T-SQL Fundamentals
Microsoft SQL Server 2012 T-SQL Fundamentals
I’m very happy that Itzik has managed to find the time and energy to produce a book about T-SQL fundamentals. For many years, Itzik has been using his great Microsoft SQL Server teaching, mentoring, and consulting experience to write books on advanced programming subjects, leaving a significant gap not only...
Mac OS X Power User's Guide (Mac/Graphics)
Mac OS X Power User's Guide (Mac/Graphics)
So what is the big deal about a new operating system from Apple?

Just those very words: new, operating, system, and Apple are enough to get the blood of every Mac geek on the planet boiling with anticipation. But why should the rest of us care?

Having specialized in the Linux operating system for
...
Guide to Scientific Computing in C++ (Undergraduate Topics in Computer Science)
Guide to Scientific Computing in C++ (Undergraduate Topics in Computer Science)
Many books have been written on the C++ programming language, varying across a spectrum from the very practical to the very theoretical. This book certainly lies at the practical end of this spectrum, and has a particular focus for the practical treatment of this language: scientific computing.

Traditionally,
...
Selectors, Specificity, and the Cascade
Selectors, Specificity, and the Cascade

Exactly how does the "cascade" in Cascading Style Sheets work? This concise guide demonstrates the power and simplicity of CSS selectors for applying style rules to different web page elements. You’ll learn how your page’s presentation depends on a multitude of style rules and the complex ways they...

Pro SQL Server 2012 Administration (Professional Apress)
Pro SQL Server 2012 Administration (Professional Apress)

Pro SQL Server 2012 Administration is a one-stop source for all the knowledge you'll need to professionally manage a database under Microsoft SQL Server 2012. SQL Server administration is a complex field requiring an unusually broad and well-rounded skill set. A good database administrator must be part system...

MintDuino: Building an Arduino-compatible Breadboard Microcontroller
MintDuino: Building an Arduino-compatible Breadboard Microcontroller
The MintDuino is deceiving—this little tin of electronics is capable of providing the brains for an unlimited number of devices limited only by your imagination… and, of course, your bank account.

While the MintDuino is certainly capable of being used during a moment of inspiration,
...
Result Page: 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy