Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Digital Lighting and Rendering (2nd Edition)
Digital Lighting and Rendering (2nd Edition)

Crafting a perfect rendering in 3D software means nailing all the details. And no matter what software you use, your success in creating realistic-looking illumination, shadows and textures depends on your professional lighting and rendering techniques. In this lavishly illustrated new edition, Pixar's Jeremy Birn shows you how...

Garageband 2: The Missing Manual
Garageband 2: The Missing Manual

Whether you're a professional musician or a mere novice, Apple's GarageBand software has everything you need to produce commercial-quality recordings entirely on your own. Just imagine how many thousands of singers and instrumentalists remain undiscovered because they lack the capability to produce viable demos. Well, no...

EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Advanced Java 2 Platform: How to Program (With CD-ROM)
Advanced Java 2 Platform: How to Program (With CD-ROM)
The authoritative DEITEL LIVE-CODE guide to programming with the Java 2 Enterprise (J2SE), Standard (J2SE) and Micro (J2ME) Editions

Java has revolutionized application and enterprise-systems...

Digital Image Processing (2nd Edition)
Digital Image Processing (2nd Edition)
Interest in digital image processing methods stems from two principal application
areas: improvement of pictorial information for human interpretation; and
processing of image data for storage, transmission, and representation for autonomous
machine perception.This chapter has several objectives: (1) to define
the scope of the
...
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Remote Sensing: The Image Chain Approach
Remote Sensing: The Image Chain Approach
Remote Sensing deals with the fundamental ideas underlying the rapidly growing field of remote sensing. John Schott explores energy-matter interaction, radiation propagation, data dissemination, and described the tools and procedures required to extract information from remotely sensed data using the image chain approach. Organizations and...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Fundamentals of Logic Design (with Companion CD-ROM)
Fundamentals of Logic Design (with Companion CD-ROM)

After studying this text, you should be able to apply switching theory to the solution of logic design problems.This means that you will learn both the basic theory of switching circuits and how to apply it. After a brief introduction, you will study Boolean algebra, which is the basic mathematical tool needed to analyze and synthesize...

unlimited object storage image
Result Page: 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy