Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 (2nd Edition)
Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 (2nd Edition)
Interconnecting Cisco Network Devices, Part 1 (ICND1), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCENT™ and CCNA® foundation learning. This book provides you with the knowledge needed to configure Cisco switches and routers to operate in corporate internetworks. By reading this book, you will gain a...
IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Be Fast or Be Gone: Racing the Clock with Critical Chain Project Management
Be Fast or Be Gone: Racing the Clock with Critical Chain Project Management
Mike Knight, an executive in a semiconductor firm, learns that his eight-year-old son Tim has a rare form of brain cancer. Tim's best hope for long-term survival is a drug called Supragrel. Unfortunately, Supragrel is still in early clinical trials and may reach the market too late. Mike makes the agonizing decision to quit his job and go to...
Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Robohelp for the Web
Robohelp for the Web
This guide explains the use and administration of eHelp's latest software package, emphasizing administrator setup and maintenance.

Provides with an explanation of installing and configuring RoboHelp and presents an outline for creating a documentation plan. Softcover. CD-ROM included.

RoboHelp Enterprise is
...
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. It comprises the proceedings of I3E2004, the Fourth International Conference on E-Commerce,...
Pro Silverlight for the Enterprise (Books for Professionals by Professionals)
Pro Silverlight for the Enterprise (Books for Professionals by Professionals)

Microsoft Silverlight 2 is a new development platform designed to make the development of Rich Internet Applications (RIAs) far easier than has previously been possible. Pro Silverlight for the Enterprise addresses the question of how you can bring Silverlight 2 to your company to provide rich Internet experiences that will interface...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Management Information Systems (12th Edition)
Management Information Systems (12th Edition)

We wrote this book for business school students who want an in-depth look at how today's business firms use information technologies and systems to achieve corporate objectives. Information systems are one of the major tools available to business managers for achieving operational excellence, developing new products and services,...

The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models
The Handbook of Financial Modeling: A Practical Approach to Creating and Implementing Valuation Projection Models

The ability to create and understand financial models that assess the valuation of a company, the projects it undertakes, and its future earnings/profit projections is one of the most valued skills in corporate finance. However, while many business professionals are familiar with financial statements and accounting reports, few are truly...

Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
unlimited object storage image
Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy