Home | Amazing | Today | Tags | Publishers | Years | Search 
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Background Screening and Investigations: Managing Hiring Risk from the HR and Security Perspectives
Every company needs to protect its people and other assets by managing risk in the hiring process!

Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be
...
Learning Processing: A Beginner's Guide to Programming Images, Animation, and Interaction
Learning Processing: A Beginner's Guide to Programming Images, Animation, and Interaction
Teaches graphic artists the fundamentals of computer programming within a visual playground!

This book teaches you the basic building blocks of programming needed to create cutting-edge graphics applications including interactive art, live video processing, and data visualization. A unique lab-style manual, the book gives graphic
...
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
System Level Design with Rosetta (Systems on Silicon)
System Level Design with Rosetta (Systems on Silicon)
The steady and unabated increase in the capacity of silicon has brought the semiconductor industry to a watershed challenge. Now a single chip can integrate a radio transceiver, a network interface, multimedia functions, all the "glue" needed to hold it together as well as a design that allows the hardware and software to be reconfigured...
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

It's hard to remember a world without the Internet. We now take for granted that we can access our bank accounts and health records, get driving directions, talk to friends, and shop, all on the Internet. Many companies couldn't survive without it because it is their link to their customers.

But the...

Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Weaving a Library Web: A Guide to Developing Children's Websites
Weaving a Library Web: A Guide to Developing Children's Websites
We have entered a digital age in which preschoolers can handle a mouse better than a crayon. In this digital world children want to interact with information, not just receive it. Technology is as ordinary to them as television and radio were to previous generations. Computers and the Internet provide them with information and entertainment,...
Zigbee Wireless Networking
Zigbee Wireless Networking
Written by a member of the ZigBee Alliance, a consortium of over 200 companies promoting and maintaining this standard globally!

ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. This standard allows for the creation of very lost cost and low power networks - these applications run for
...
Creating Interactive Web Sites with PHP and Web Services
Creating Interactive Web Sites with PHP and Web Services

Build Dynamic Websites with PHP and MySQL—and Extend Those Sites with Web Services

PHP and MySQL are great tools for building database-driven websites. There's nothing new about that. What is new is the environment in which your site operates—a world rich (and growing
...

Vba for Excel Made Simple (Made Simple Programming)
Vba for Excel Made Simple (Made Simple Programming)
This book provides an introduction to VBA for Excel for new users. It covers basic concepts of VBA and of macro programming, and takes the reader through the process of constructing interactive working applications. Features which make it particularly suitable for new and non-technical users are: * step-by-step approach * avoidance of jargon *...
Result Page: 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy