Home | Amazing | Today | Tags | Publishers | Years | Search 
CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...

Encyclopedia of Global Warming and Climate Change (3 Volume Set)
Encyclopedia of Global Warming and Climate Change (3 Volume Set)

2008 Best Reference, Library Journal

“The impact of global warming is rapidly evolving. This valuable resource provides an excellent historical overview and framework of this topic and serves as a general resource for geography, oceanography, biology, climatology, history, and many other
...

Germs, Genes, & Civilization: How Epidemics Shaped Who We Are Today
Germs, Genes, & Civilization: How Epidemics Shaped Who We Are Today

“Clear, thoughtful, and thought-provoking, Germs, Genes & Civilization makes the case that infectious diseases have played a major role in shaping society. Clark argues that religion, morals, and even democracy have all been influenced by the smallest and most dangerous organisms on our planet. While...

Environmental Pollution and Control, Fourth Edition
Environmental Pollution and Control, Fourth Edition

Complex environmental problems are often reduced to an inappropriate level of simplicity. While this book does not seek to present a comprehensive scientific and technical coverage of all aspects of the subject matter, it makes the issues, ideas, and language of environmental engineering accessible and understandable to the nontechnical...

Technological Turf Wars: A Case Study of the Antivirus Industry
Technological Turf Wars: A Case Study of the Antivirus Industry

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that...

Financial Accounting
Financial Accounting

This revision of Financial Accounting is the most significant in the book’s long history. The substantial changes we have made are geared to meeting the needs of today’s students, who not only face a business world increasingly complicated by ethical issues, globalization, and technology, but who also have more demands on their...

Managing For Dummies (Business & Personal Finance)
Managing For Dummies (Business & Personal Finance)

The fast and easy way to learn how to manage people, projects, and teams

Being a manager can be an intimidating and challenging task. Managing involves teaching new skills to employees, helping land a new customer, accomplishing an important assignment, increasing performance, and much more. The process of management can be...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Library and Information Center Management (Library and Information Science Text Series)
Library and Information Center Management (Library and Information Science Text Series)

Thirty years ago, when the first edition of this book was published, little had been written about the management of libraries and information centers. Those seeking advice, examples, and information about how to manage libraries were forced to search for answers in the literature of public administration or business management. Since...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Principles of Accounting
Principles of Accounting
This revision of Principles of Accounting is the most significant in the book’s long history. The substantial changes we have made meet the needs of today’s students, who not only face a business world increasingly complicated by ethical issues, globalization, and technology, but who also have more demands on their...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy