Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Flash Foresight: How to See the Invisible and Do the Impossible
Flash Foresight: How to See the Invisible and Do the Impossible

Flash Foresight offers seven radical principles you need to transform your business today. From internationally renowned technology forecaster Daniel Burrus—a leading consultant to Google, Proctor & Gamble, IBM, and many other Fortune 500 firms—with John David Mann, co-author of the Wall Street Journal...

Special Edition Using Microsoft CRM
Special Edition Using Microsoft CRM

A sophisticated yet easy-to-use software program, Microsoft CRM handles the full range of Sales and Customer Service functions, and allows the user to access key customer and sales information from Microsoft Outlook and the Web. It is designed for rapid deployment, ease of use, and integration with Microsoft Office and Microsoft Great Plains'...

PC Magazine Digital SLR Photography Solutions
PC Magazine Digital SLR Photography Solutions

If you want to use your Digital SLR camera like a pro, let a pro (or two) show you how! Sally Wiener Grotta and Daniel Grotta have been covering the world of digital photography since 1991, and this book is like a private course in DSLR mastery. From understanding the parts of your camera to using the controls effectively to shooting stunning,...

Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
The world is charging towards the new network technologies of broadband and 3G and new application technologies face the challenge of where they can be used. This book takes a pragmatic look at two particular application technologies - location and personalisation - and presents an understanding of the technical and business impact of these...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Making up the Mind: How the Brain Creates Our Mental World
Making up the Mind: How the Brain Creates Our Mental World
Inside your head there is an amazing labor-saving device; more effective than the latest high-tech computer. Your brain frees you from the everyday tasks of moving about in the world around you, allowing you to concentrate on the things that are important to you: making friends and influencing people. However, the ‘you’ that is released...
Algebraic Models in Geometry (Oxford Graduate Texts in Mathematics)
Algebraic Models in Geometry (Oxford Graduate Texts in Mathematics)
Rational homotopy is a very powerful tool for differential topology and geometry. This text aims to provide graduates and researchers with the tools necessary for the use of rational homotopy in geometry. Algebraic Models in Geometry has been written for topologists who are drawn to geometrical problems amenable to topological methods and also...
Character Animation in 3D, : Use traditional drawing techniques to produce stunning CGI animation
Character Animation in 3D, : Use traditional drawing techniques to produce stunning CGI animation
Finally! A forthright approach to a complex art form. An inspired text that fuses an essential understanding of fundamental traditional methods and technology.
Rita Osei, Animation & Graphics Producer, Cartoon Network, Boomerang, Toonami

It was surely a matter of time before a publication like this emerged. An understanding of
...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Smashing WordPress: Beyond the Blog
Smashing WordPress: Beyond the Blog

GO BEYOND THE BLOG

Smashing WordPress shows you how to utilize the power of the WordPress platform, and provides a creative spark to help you build WordPress-powered sites that go beyond the obvious. You will learn the core concepts used to build just about anything in WordPress, resulting in fast deployments and...

Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy