Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Developing with Google App Engine (Firstpress)
Developing with Google App Engine (Firstpress)
Developing with Google App Engine introduces development with Google App Engine, a platform that provides developers and users with infrastructure Google itself uses to develop and deploy massively scalable applications.
  • Introduction to concepts
  • Development with App Engine
  • Deployment into App...
Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
Guide to Neuropsychiatric Therapeutics
Guide to Neuropsychiatric Therapeutics

Written primarily by Fellows of the American Neuropsychiatric Association, this handbook offers practical, explicit, evidence-based guidelines for diagnosis and treatment of neuropsychiatric disorders. Concise, clinically oriented chapters cover all psychiatric and behavioral disorders associated with brain dysfunction. Each chapter...

The Tao of Computing
The Tao of Computing
What should every citizen know about computers and computer technology? For better or worse, answers typically depend upon who is asked.

• Students commonly have a practical bent: How can one get the computer to perform specific tasks, why does a machine act the way it does, what is involved in getting computers to interact, and so
...
Advanced J2EE Platform Development: Applying Integration Tier Patterns
Advanced J2EE Platform Development: Applying Integration Tier Patterns
A proven Java(TM)-based approach to standardizing and streamlining legacy migration

This book focuses on the key challenges developers face when using the Java 2 platform Enterprise Edition (J2EE) to encapsulate legacy applications for delivery in a multi-tier Internet environment. Leading Sun architects Torbjoern Dahlen and Thorbioern Fritzon...

WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
Artificial Vision: Image Description, Recognition, and Communication (Signal Processing and its Applications)
Artificial Vision: Image Description, Recognition, and Communication (Signal Processing and its Applications)
Artificial vision is a rapidly growing discipline, aiming to build computational models of the visual capabilites in humans, as well as the machines that emulate them. Recent research work suggests that vision is a complex functionality, involving active sensing and attentional mechanisms, and is strictly related to cognitive processes like...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy