Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Alfresco 3 Records Management
Alfresco 3 Records Management

This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software...

After Nationalism: Being American in an Age of Division (Radical Conservatisms)
After Nationalism: Being American in an Age of Division (Radical Conservatisms)

Nationalism is on the rise across the Western world, serving as a rallying cry for voters angry at the unacknowledged failures of globalization that has dominated politics and economics since the end of the Cold War. In After Nationalism, Samuel Goldman trains a sympathetic but skeptical eye on the trend, highlighting the deep...

C++ for Dummies
C++ for Dummies
Create your first C++ program before you finish Chapter 1!

The fun and easy way® to start programming with this popular, object-oriented language

This friendly guide is now updated to cover the latest ANSI C++ standard. Even if you’re a programming newbie, you’ll be building and debugging C++ programs, creating...

Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

Mathematics As a Science of Patterns
Mathematics As a Science of Patterns
This book expounds a system of ideas about the nature of mathematics which Michael Resnik has been elaborating for a number of years. In calling mathematics a science he implies that it has a factual subject-matter and that mathematical knowledge is on a par with other scientific knowledge; in calling it a science of patterns he expresses his...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Developing Series 60 Applications: A Guide for Symbian OS C++ Developers
Developing Series 60 Applications: A Guide for Symbian OS C++ Developers

The first official book on Series 60 Platform development—from design to deployment

Series 60 smartphone developers are deploying the next wave of mobile services. With more than 60% of all mobile phone manufacturers licensing Series 60 Platform, Series 60 represents the smartphone market with the largest user...

Date on Database: Writings 2000-2006
Date on Database: Writings 2000-2006

Date on Database: Writings 2000&emdash;2006 captures some of the freshest thinking from widely known and respected relational database pioneer C. J. Date. Known for his tenacious defense of relational theory in its purest form, Date tackles many topics that are important to database professionals, including the difference between...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Managing Cisco Network Security
Managing Cisco Network Security
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy