Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Cryptology and Web Security
Practical Cryptology and Web Security
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.
...
Populations, Public Health, and the Law
Populations, Public Health, and the Law
Law plays a crucial role in protecting the health of populations. Whether the public health threat is bioterrorism, pandemic influenza, obesity, or lung cancer, law is an essential tool for addressing the problem. Yet for many decades, courts and lawyers have frequently overlooked law's critical importance to public health. "Populations,...
Next Generation Business Strategies for the Base of the Pyramid: New Approaches for Building Mutual Value
Next Generation Business Strategies for the Base of the Pyramid: New Approaches for Building Mutual Value
During the last decade, first-generation "Base of the Pyramid" (BoP) ventures focused primarily on "finding a fortune at the BoP" by selling existing goods to and sourcing familiar products from the world's four billion poorest people. Many of these initiatives did not scale, and some failed outright. But through...
Tableau For Dummies (For Dummies (Computer/tech))
Tableau For Dummies (For Dummies (Computer/tech))

Make your data work for you!

Tableau For Dummies brings order to the chaotic world of data. Understanding your data and organizing it into formats and visualizations that make sense to you are crucial to making a real impact on your business with the information that's already at your fingertips. This easy-to-use...

Requirements Analysis: From Business Views to Architecture
Requirements Analysis: From Business Views to Architecture
The complete guide to requirements analysis for every system analyst and project team member.

Thousands of software projects are doomed from the start because they're based on a faulty understanding of the business problem that must be solved. The solution is effective requirements analysis. In Requirements Analysis: From Business Views to...

Pro ASP.NET for SQL Server: High Performance Data Access for Web Developers (Proffesional Reference Series)
Pro ASP.NET for SQL Server: High Performance Data Access for Web Developers (Proffesional Reference Series)
Pro ASP.NET for SQL Server: High Performance Data Access for Web Developers explains how to use ASP.NET 2.0 and SQL Server 2005 most efficiently together. It covers all crucial performance issues and illustrates optimal techniques with enterprise-quality development.

Performance is always an issue, and optimizing database access is one...

Digital Music Making for Teens
Digital Music Making for Teens
Get ready to move beyond the stage of simply ripping audio from CDs to the more creative ends of digital music production. The sheer volume and variety of computer-based production techniques can often seem daunting. "Digital Music Making for Teens" eases beginning musicians through that first crucial step into the larger world of digital...
Clutch: Why Some People Excel Under Pressure and Others Don't
Clutch: Why Some People Excel Under Pressure and Others Don't
Is clutch performance innate-or can it be learned? 

Sooner or later everyone encounters a situation in which the stakes are high and the outcome is crucial. And even top performers can crumble when faced with such extreme pressure. Consider the CEO who panics in a desperate attempt to shore up his...

Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
The Data-Driven Project Manager: A Statistical Battle Against Project Obstacles
Discover solutions to common obstacles faced by project managers. Written as a business novel, the book is highly interactive, allowing readers to participate and consider options at each stage of a project. The book is based on years of experience, both through the author's research projects as well as his teaching lectures at business...
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to...

Beginning XNA 2.0 Game Programming: From Novice to Professional
Beginning XNA 2.0 Game Programming: From Novice to Professional
Would you like to create your own games, but never have the time to dig into the details of multimedia programming? Now you don’t have to! XNA makes it simple to create your own games, which will run on your PC and Xbox 360 console. Even if you don’t know how to program at all, Beginning XNA 2.0 Game Programming: From Novice to...
unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy