Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Industrial Applications of Lasers, Second Edition
Industrial Applications of Lasers, Second Edition
A practical book with a variety of uses, this book can help applications engineers spark problem-solving techniques through the use of lasers. Industrial Application of Lasers, Second Edition takes the reader through laser fundamentals, unusual properties of laser light, types of practical lasers available, and commonly used...
Advances in Lithium-Ion Batteries
Advances in Lithium-Ion Batteries

In the decade since the introduction of the first commercial lithium-ion battery research and development on virtually every aspect of the chemistry and engineering of these systems has proceeded at unprecedented levels. This book is a snapshot of the state-of-the-art and where the work is going in the near future. The book is intended not...

Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Encyclopedia of Electronic Circuits, Vol. 4 (cloth)
Encyclopedia of Electronic Circuits, Vol. 4 (cloth)
Volume 4 of Encyclopedia of Electronic Circuits contains many new, not previously cov ered circuits, organized into 104 chapters. Circuit titles are listed at the beginning of each chapter, for references. Most of these circuits appeared in publications since 1988 and should be very useful for obtaining new ideas for research and...
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
The twenty-first century has seen a breathtaking expansion of statistical methodology, both in scope and in influence. “Big data,” “data science,” and “machine learning” have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science...
Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, ... Papers (Lecture Notes in Computer Science)
Mathematical and Engineering Methods in Computer Science: 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, ... Papers (Lecture Notes in Computer Science)
This volume contains the post-proceedings of the 8th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2012, held in Znojmo, Czech Republic, in October, 2012. The 13 thoroughly revised papers were carefully selected out of 31 submissions and are presented together with 6 invited papers. The topics covered by...
Zero Configuration Networking: The Definitive Guide
Zero Configuration Networking: The Definitive Guide

It used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a...

Designing SQL Server 2000 Databases for .Net Enter
Designing SQL Server 2000 Databases for .Net Enter
As a consultant, the process of designing and developing technology-based solutions is
one that you get to know intimately, thanks to iteration. Having been involved in a dozen
or more projects in the past few years, I came to realize that a common component exists
at the center of every one of those solutions. That component is the
...
Electronic Circuits for the Evil Genius
Electronic Circuits for the Evil Genius

FROM CIRCUIT FAINT HEART TO CIRCUIT LION HEART IN 57 EASY AND FUN LESSONS

Featuring everything an electronics hobbyist could want to learn about circuits and circuit design, Dave Cutcher's Electronic Circuits for the Evil Genius makes it fun to achieve genuine mastery, one simple lesson at a time. What's...

PACS and Imaging Informatics: Basic Principles and Applications
PACS and Imaging Informatics: Basic Principles and Applications

The definitive guide to PACS—now with more clinically applicable material

In recent years, the field of picture archiving and communications systems—PACS—andimage informatics has advanced due to both conceptual and technological advancements. This edition of PACS and Imaging Informatics: Basic Principles...

unlimited object storage image
Result Page: 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy