Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intranets.com for Dummies (For Dummies S.)
Intranets.com for Dummies (For Dummies S.)
Small businesses face faster-paced, more demanding business environments than ever before. So do project teams within corporations and workgroups that cut across multiple organizations.

No matter where you work, getting “the job” done requires teamwork and collaboration that’s up-to-the-minute among colleagues whose
...
MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework
MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework

This certification exam measures your ability to develop and implement middle-tier components, server components, and XML Web services by using Visual Studio .NET and the Microsoft .NET Framework. This exam counts as a core credit toward the new MCAD (Microsoft Certified Application Developer) certification as well as a core credit toward the...

Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
The Asia Simulation Conference 2006 (JSST 2006) was aimed at exploring challenges in methodologies for modeling, control and computation in simulation, and their applications in social, economic, and financial fields as well as established scientific and engineering solutions. The conference was held in Tokyo from October 30 to November 1, 2006,...
Foundations of Java for ABAP Programmers
Foundations of Java for ABAP Programmers
Java has been a part of developers’ vocabularies since 1995. At first it was thought of as
being a nice, neat little language that could do some amazing things for the Internet. However,
the language soon matured, and it still kept its simple approach. Developers started to realize
the awesome power of a clean uncluttered
...
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity
Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity

A landmark manifesto about the genuine closing of the American mind.

Lawrence Lessig could be called a cultural environmentalist. One of America's most original and influential public intellectuals, his focus is the social dimension of creativity: how creative work builds on the past and how society encourages or inhibits
...

Case Study Research in Software Engineering: Guidelines and Examples
Case Study Research in Software Engineering: Guidelines and Examples

Based on their own experiences of in-depth case studies of softwareprojects in international corporations, in this book theauthors present detailed practical guidelines on the preparation,conduct, design and reporting of case studies of softwareengineering.  This is the first software engineering specificbook on the case study...

Mastering FreeBSD and OpenBSD Security
Mastering FreeBSD and OpenBSD Security

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Deflation: What Happens When Prices Fall
Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN Washington, D.C. The Federal Reserve held its Federal Open Market Committee (FOMC) meeting in its two-storied chandeliered boardroom at the central bank's white marble temple on Constitution Avenue. Now, there was nothing unusual about the FOMC gathering. The committee meets...
Inter-Organizational Information Systems in the Internet Age
Inter-Organizational Information Systems in the Internet Age

Since the U.S. Department of Defense initiated the development of networked computers in 1969, Internet technologies have rapidly advanced and revolutionized the way we communicate and conduct business. The second wave of the technological revolution came with intranet technology in the mid-1990s. With the intranet,...

Planning and Design for High-Tech Web-Based Training
Planning and Design for High-Tech Web-Based Training
Web-based training (WBT) refers to on-line learning delivered over the
World Wide Web (WWW) via the public Internet or a private, corporate
intranet. Although on-line learning is not actually new—it has been
around since the 1960s—it is the Internet’s user-friendly interface, coupled
with improved technology,
...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy