Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Twitter API: Up and Running: Learn How to Build Applications with the Twitter API
Twitter API: Up and Running: Learn How to Build Applications with the Twitter API
This groundbreaking book provides you with the skills and resources necessary to build web applications for Twitter. Perfect for new and casual programmers intrigued by the world of microblogging, Twitter API: Up and Running carefully explains how each part of Twitter's API works, with detailed examples that show you how to assemble those...
Wireless Broadband: Conflict and Convergence (IEEE Series on Digital & Mobile Communication)
Wireless Broadband: Conflict and Convergence (IEEE Series on Digital & Mobile Communication)
"This is as comprehensive a book on wireless broadband as I have seen. The authors address the most important issues facing the players in the wireless ecosystem in great detail and provide a very thoughtful analysis."

—Steve Elfman, President, Sprint Nextel

"An insightful book that takes a...

Ubuntu Linux Secrets
Ubuntu Linux Secrets
The everyday Linux user can easily get overwhelmed by the complexity of the new software that exists when creating an Ubuntu system. This book covers the basics of creating a new system from scratch and explains what software is installed. You’ll take a tour of installing the Ubuntu Linux distribution system in most environments, including...
Personality Disorders in Modern Life
Personality Disorders in Modern Life
A revision of the leading textbook on personality disorders by renowned expert Theodore Millon

"Personalities are like impressionistic paintings. At a distance, each person is ‘all of a piece’; up close, each is a bewildering complexity of moods, cognitions, and motives."
–Theodore Millon

...
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
Programming Scala: Tackle Multi-Core Complexity on the Java Virtual Machine (Pragmatic Programmers)
Programming Scala: Tackle Multi-Core Complexity on the Java Virtual Machine (Pragmatic Programmers)
The increasing popularity and availability of multicore processors is creating a whole new set of challenges--although you can enjoy true concurrency, you're now faced with higher contention and synchronization issues. Deploying an existing application on a multicore processor may bring out previously hidden concurrency issues. Java's...
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
What Top Managers Really Need to Know about Information Technology

"These kinds of productivity principles are not mere theory. When we put these same principles into effect, our productivity went up more than we had thought possible. And our employee morale went up, too. It became easier to write code the right way and harder to make...

Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Alternative Methods of Regression (Wiley Series in Probability and Statistics)
Alternative Methods of Regression (Wiley Series in Probability and Statistics)
Since its discovery almost 200 years ago, least squares has been the most popular method of regression analysis. A statistics book with the word "regression" in its title, without any qualifying adjective such as "robust" or "nonparametric" or "alternative", can be assumed to be about least-squares...
Database Technologies: Concepts, Methodologies, Tools, and Applications
Database Technologies: Concepts, Methodologies, Tools, and Applications
The expanding possibilities and promising current and future potential that lies within the advancing field of database technologies encompasses many aspects of life as its beneficial features and innovative functions are seen impacting society at countless diverse angles.

Database Technologies: Concepts, Methodologies, Tools, and...

Electric Power Systems: A Conceptual Introduction (Wiley Survival Guides in Engineering and Science)
Electric Power Systems: A Conceptual Introduction (Wiley Survival Guides in Engineering and Science)
A clear explanation of the technology for producing and delivering electricity

Electric Power Systems explains and illustrates how the electric grid works in a clear, straightforward style that makes highly technical material accessible. It begins with a thorough discussion of the underlying physical...

Result Page: 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy