Home | Amazing | Today | Tags | Publishers | Years | Search 
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Instant Boris Effects (VASST Instant)
Instant Boris Effects (VASST Instant)
Boris plug-in applications, including Graffiti, FX, and Red, permit video editors to add titling, effects, compositing, and 3D capabilities to their nonlinear editing (NLE) systems. Documentation and training materials have been notoriously lacking for these applications. Instant Boris Effects is a complete guide for novice and intermediate users...
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
The promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until...
Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
Oracle DBA on UNIX and Linux (Kaleidoscope)
Oracle DBA on UNIX and Linux (Kaleidoscope)
Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency,...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

The Stand: Expanded Edition: For the First Time Complete and Uncut
The Stand: Expanded Edition: For the First Time Complete and Uncut

This is the way the world ends: with a nanosecond of computer error in a Defense Department laboratory and a million casual contacts that form the links in a chain letter of death.

And here is the bleak new world of the day after: a world stripped of its institutions and emptied of 99 percent of its people. A world in which a handful
...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy