Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Building a PC For Dummies
Building a PC For Dummies
Got a screwdriver? You can put together your own PC!

Build the foundation, install an operating system, and add the cool stuff

You'll be amazed at how easy it can be to assemble your own PC — and how much fun you can have! This book skips the techno-talk and takes you through the process step by step. Install sound and video...

Handbook of Research on Fuzzy Information Processing in Databases
Handbook of Research on Fuzzy Information Processing in Databases
Information technology is one of the most rapidly changing disciplines, especially with the fuzzy extension. Fuzzy databases have been studied in many works and papers but, in general, these works study some particular area and many works are theoretical works, with very few real applications.

The Handbook of Research on Fuzzy...

Documentary in the Digital Age
Documentary in the Digital Age
If you want to learn from the leading lights of today's revolution in documentary filmmaking Maxine Baker has written the guide you need to own. You'll discover the many different and innovative approaches to documentary form and style arising from the use of innovative new technology. A tribute to the mavericks of creativity, inside you will find...
Advertising Secrets of the Written Word: The Ultimate Resource on How to Write Powerful Advertising Copy from One of America's Top Copywriters and Mail Order Entrepreneurs
Advertising Secrets of the Written Word: The Ultimate Resource on How to Write Powerful Advertising Copy from One of America's Top Copywriters and Mail Order Entrepreneurs
Every trade has its role models. And for me, there is no better model for ad copywriters or maazine editors... -- Ray Schultz, Editor, DIRECT Magazine

I have been a fan of Joseph Sugarman's copywriting and marketing ideas for years and have benefited greatly... -- Jack Canfield, Co-author, Chicken Soup for the Soul
...
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments
In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches....
Mastering Microsoft SQL Server 2005
Mastering Microsoft SQL Server 2005

The Comprehensive Resource for SQL Server 2005 Administrators, Consultants, and Developers

Whether you're a systems administrator, database application developer, or IT consultant, you'll quickly ratchet up your knowledge of Microsoft SQL Server 2005 with this thorough and comprehensive guide. Light...

QuickTime Toolkit Volume One: Basic Movie Playback and Media Types (QuickTime Developer Series)
QuickTime Toolkit Volume One: Basic Movie Playback and Media Types (QuickTime Developer Series)
"When QuickTime application developers get stuck, one of the first places they look for help is example code from the QuickTime Engineering team. Finally, these well-crafted examples and clear descriptions are available in book form-a must-have for anyone writing applications that import, export, display, or interact with QuickTime...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
OFDM Towards Fixed and Mobile Broadband Wireless Access
OFDM Towards Fixed and Mobile Broadband Wireless Access
Presenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
The Wireless Application Protocol (WAP): A Wiley Tech Brief
The Wireless Application Protocol (WAP): A Wiley Tech Brief
Discover how to utilize the latest WAP technologies to meet your business needs With wireless services rapidly exploding worldwide, WAP is becoming the most talked about standard for wireless applications. In this accessible book, mobility experts Steve Mann and Scott Sbihli cut through the buzz and the jargon surrounding the technology to provide...
Result Page: 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy