Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Beginning Silverlight 4 in C#
Beginning Silverlight 4 in C#

The growing popularity of Web 2.0 applications is increasing user expectations for high-quality web site design, presentation, and functionality. It is into this climate that Microsoft is releasing Silverlight 4, the third and latest iteration of its cross-browser web presentation technology. Beginning Sliverlight 4 brings you to the...

ePublishing with InDesign CS6: Design and produce digital publications for tablets, ereaders, smartphones, and more
ePublishing with InDesign CS6: Design and produce digital publications for tablets, ereaders, smartphones, and more

Here's the designer's guide to creating excellent e-books with InDesign

Creative professionals are designing more and more e-books and e-zines as digital publishing increasingly gains market share. This book pulls together a wide range of essential information to help them maximize the versatility of InDesign for...

Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing
Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing

The ground beneath the book publishing industry dramatically shifted in 2007, the year the Kindle and the iPhone debuted. Widespread consumer demand for these and other devices has brought the pace of digital change in book publishing from "it might happen sometime" to "it’s happening right now"—and it...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Cardiac Gene Expression: Methods and Protocols (Methods in Molecular Biology)
Cardiac Gene Expression: Methods and Protocols (Methods in Molecular Biology)

This book presents both cutting-edge and established methods for studying cardiac gene expression. The protocols provide a template for solid research, and cover the process through screening, analysis, characterization, and functional confirmation of novel genes or known genes with a new function. The concluding section of the book...

DK Eyewitness Lisbon (Travel Guide)
DK Eyewitness Lisbon (Travel Guide)
Discover Europe's capital of cool

Whether you want to explore the jumbled streets of Alfama, take in the fantastic views from Castelo de São Jorge, or simply sample the city's iconic custard tarts, your DK Eyewitness travel guide makes sure you experience all that Lisbon has to offer.

As one
...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Business Intelligence for Telecommunications (Informa Telecoms & Media)
Business Intelligence for Telecommunications (Informa Telecoms & Media)
Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, Business Intelligence for Telecommunications identifies those advances in both methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
OpenCL Parallel Programming Development Cookbook
OpenCL Parallel Programming Development Cookbook

OpenCL (Open Computing Language) is the first royalty-free standard for cross platform, parallel programming of modern processors found in personal computers, servers, mobiles, and embedded devices. OpenCL greatly improves speed and responsiveness for a wide spectrum of applications in numerous market categories, from gaming and entertainment...

OpenGL ES 3.0 Programming Guide (2nd Edition)
OpenGL ES 3.0 Programming Guide (2nd Edition)

OpenGL®  ES is the industry’s leading software interface and graphics library for rendering sophisticated 3D graphics on handheld and embedded devices. The newest version, OpenGL ES 3.0, makes it possible to create stunning visuals for new games and apps, without compromising device performance or...

unlimited object storage image
Result Page: 134 133 132 131 130 129 128 127 126 125 124 123 122 121 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy