Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Chemical Technology and Pollution Control, 3rd Edition, Third Edition
Handbook of Chemical Technology and Pollution Control, 3rd Edition, Third Edition

The objectives of the second edition have been maintained and updated to 2005 in the current volume where users will find that one third of the references, now totaling more than 1300, are new to this edition. At the same time most of the in-depth Further Reading suggestions are new to this volume, and production data of some 30 tables...

Orchard CMS: Up and Running
Orchard CMS: Up and Running
A few months back, I wanted to create an online presence for my band, Daisy’s Gone. In the past, I would have started from scratch. But I remembered all the domains I’ve accumulated over the years that are now nothing more than parking pages at my registrar. It’s generally not hard to throw...
Maintainable JavaScript
Maintainable JavaScript
The professionalization of web development has been a difficult journey because of our disparate beginnings. Even those who end up at large companies such as Yahoo! inevitably began on their own, hacking around. Perhaps you were even “the web guy” at a small company and could do pretty much whatever you...
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Practical Load Balancing: Ride the Performance Tiger
Practical Load Balancing: Ride the Performance Tiger
The Internet, and in particular the World Wide Web, have effectively leveled the playing field for businesses and individuals around the world. Do you have a great idea for a web site or a service? Even the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial outlay. You can get...
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate e-mail? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure and manageable way.

...
Financial Simulation Modeling in Excel, + Website: A Step-by-Step Guide (Wiley Finance)
Financial Simulation Modeling in Excel, + Website: A Step-by-Step Guide (Wiley Finance)
Regardless of where I work, simulation has crept into my financial career. After nearly a decade of working with it in many capacities I’ve found it to be a mixed blessing. In many investment companies when the term simulation is simply brought up there are a variety of reactions. The two most visible camps of thought...
The WordPress Anthology
The WordPress Anthology
WordPress is the most widely used website platform and content management system on the Web today, running on approximately 15% of websites. It is open source and, hence, free, released under the GNU Public License version 2, or GPL2 for short. Its permissive use and development license, combined with its ease of use from both a...
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy