Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Security, Eighth Edition
Introduction to Security, Eighth Edition

Introduction to Security, 8th Edition, has been the leading introduction to private security for over thirty years, celebrated for its balanced and professional approach to this increasingly important area. Now the eighth edition expands the key topics and adds material on important issues in the 21st c environment.

...

Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier

The Internet is like the Old West a frontier rich with opportunity and hope, but also a rough-and-tumble land of questionable characters, dubious legal jurisdictions, and hidden dangers. And just like the Old West, if you want to stake out your territory, you have to get there first and fend for yourself. On the web, that means defending your...

Microarray Image Analysis: An Algorithmic Approach
Microarray Image Analysis: An Algorithmic Approach

To harness the high-throughput potential of DNA microarray technology, it is crucial that the analysis stages of the process are decoupled from the requirements of operator assistance. Microarray Image Analysis: An Algorithmic Approach presents an automatic system for microarray image processing to make this...

Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Creative Motion Graphic Titling for Film, Video, and the Web
Creative Motion Graphic Titling for Film, Video, and the Web

Captivate your audience and enhance your storytelling with this tutorial based 4-color cookbook, featuring dozens of solutions to your titling needs. Each chapter includes case studies and interviews with the pros, lending cutting insight and lessons learned that will have you creating inspired title sequences in no time.

The book...

Data Warehousing Fundamentals for IT Professionals
Data Warehousing Fundamentals for IT Professionals

Cutting-edge content and guidance from a data warehousing expert—now expanded to reflect field trends

Data warehousing has revolutionized the way businesses in a wide variety of industries perform analysis and make strategic decisions. Since the first edition of Data Warehousing Fundamentals, numerous...

Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

Teach Yourself VISUALLY Access 2010
Teach Yourself VISUALLY Access 2010

The visual way to get up to speed on Access 2010

It's one thing to gain access to Access. It's another thing entirely to figure out how to do all the things you want to do in Access, because the software is not all that intuitive. This full-color guide clearly shows you how to get the most out of Access 2010, including how...

JavaScript Testing Beginner's Guide
JavaScript Testing Beginner's Guide

JavaScript is an important part of web development in today's Web 2.0 world. While there are many JavaScript frameworks in the market, learning to write, test, and debug JavaScript without the help of any framework will make you a better JavaScript developer. However, testing and debugging can be time consuming, tedious, and painful. This...

Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

A+ Guide to Hardware: Managing, Maintaining and Troubleshooting
A+ Guide to Hardware: Managing, Maintaining and Troubleshooting

Written by best-selling PC repair author and educator Jean Andrews, the fifth edition of A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting maps fully to CompTIA's 2009 A+ Exam objectives. This full-color guide is the most complete, step-by-step book available for learning the fundamentals of supporting and troubleshooting...

Oracle CRM On Demand Dashboards (Osborne ORACLE Press Series)
Oracle CRM On Demand Dashboards (Osborne ORACLE Press Series)

Design and Deliver Oracle CRM On Demand Dashboards

Create custom, interactive dashboards to deliver actionable business intelligence directly to end users with help from this Oracle Press guide. Oracle CRM On Demand Dashboards provides comprehensive coverage of the versatile features available in Oracle Answers On Demand...

Result Page: 841 840 839 838 837 836 835 834 833 832 831 830 829 828 827 826 825 824 823 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy