Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile Messaging Technologies and Services: SMS, EMS and MMS
Mobile messaging is practically the first data communication service in the wireless domain. It is a major advance on the conventional practice of providing only voice communication service over the wireless interface. Thus, mobile messaging is the initial step to bring the Internet to wireless terminals and has considerable importance both for...
Macromedia Flash MX Fast & Easy Web Development
Macromedia Flash MX Fast & Easy Web Development
Don't spend your time wading through manuals to learn Macromedia Dreamweaver MX. Spend it doing what you do best-creating Web pages! Design, develop, and deliver Web pages like a pro. Integrate graphics, animations, or documents into your Web pages with ease. Combining easy-to-understand instructions with visual examples, Macromedia Dreamweaver MX...
Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Adaptive Business Intelligence
Adaptive Business Intelligence
From the reviews of the first edition: 

"In this book the authors explain the science and application of numerous prediction and optimization techniques as well as how these concepts can be used to develop adaptive decision-making systems. The book is suitable for business and IT managers who make decisions in complex industrial and...

Visions of the Future: Chemistry and Life Science
Visions of the Future: Chemistry and Life Science
‘… you can’t deny the excitement the writers felt for what they are doing; and in these secular times such excitement must serve to replace the fear of the Lord as the beginning of wisdom.’?Sir Brian Pippard, Times Higher Education Supplement

‘I enjoyed these glimpses of what is going on and (always a good
...
Online Newsgathering: Research and Reporting for Journalism
Online Newsgathering: Research and Reporting for Journalism
Journalists used to rely on their notepad and pen. Today, professional journalists rely on the computerand not just for the writing. Much, if not all, of a journalists research happens on a computer.

If you are journalist of any kind, you need to know how to find the information you need online. This book will show you how to find
...
Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Millimeter Wave Technology in Wireless PAN, LAN, and MAN (Wireless Networks and Mobile Communications)
Driven by the demand for high-data-rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. These technologies include gigabit wireless personal area networks (WPAN), high-speed wireless local area networks (WLAN), and high-speed wireless metropolitan area networks (WMAN). As a result of this...
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
This practical book is for anyone who needs to understand the solutions that allow multimedia communications between mobile networks and fixed wireless communications. It presents the fundamentals of individual fixed and mobile wireless technologies in terms of architectures, standards, management capabilities and quality of service issues, is...
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP (Wordware Database Library)
Access 2007 Programming by Example with VBA, XML, and ASP shows non-programmers how Access databases can be created, managed, and customized with Visual Basic for Applications (VBA) -- a powerful programming language built into Access. Hundreds of hands-on examples and projects throughout the book show users how to take charge of their Access...
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Stormy development of electronic computation techniques (computer systems and software), observed during the last decades, has made possible automation of data processing in many important human activity areas, such as science, technology, economics and labor organization. In a broadly understood technology area, this development led to separation...
unlimited object storage image
Result Page: 700 699 698 697 696 695 694 693 692 691 690 689 688 687 686 685 684 683 682 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy