Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Professional Photographer's Legal Handbook
The Professional Photographer's Legal Handbook
Want to make a living in photography? Anyone who does needs this indispensable guide to licensing picture rights. In this accessible and entertaining book, expert Nancy E. Wolff explains copyright, trademark, contracts, and privacy. Real-world examples of cases, laws, and news items torn from today’s headlines illustrate the most...
Coherent Behavior in Neuronal Networks (Springer Series in Computational Neuroscience)
Coherent Behavior in Neuronal Networks (Springer Series in Computational Neuroscience)

Recent experimental research advances have led to increasingly detailed descriptions of how networks of interacting neurons process information. With these developments, it has become clear that dynamic network behaviors underlie information processing, and that the observed activity patterns cannot be fully explained by simple concepts such as...

Case-Based Reasoning Research and Development: Second International Conference on Case-Based Reasoning, ICCBR-97 Providence
Case-Based Reasoning Research and Development: Second International Conference on Case-Based Reasoning, ICCBR-97 Providence
In 1995, the first International Conference on Case-Based Reasoning (ICCBR) was held in Sesimbra, Portugal, as the start of a biennial series. ICCBR-97, the Second International Conference on Case-Based Reasoning, was held at Brown University in Providence, Rhode Island, on July 25-27, 1997. The goal of the conference was to achieve a vibrant...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Basic Research in Information Science And Technology for Air Force Needs
Basic Research in Information Science And Technology for Air Force Needs
The U.S. Air Force, like the other services, is transforming itself into a new type of force with capabilities appropriate for an emerging array of new threats. The Air Force roadmap for transformation, part of the U.S. Air Force Transformation Flight Plan, describes...
   
   
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy