Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Data Mashups in R
Data Mashups in R

Programmers may spend a good part of their careers scripting code to conform to commercial statistics packages, visualization tools, and domain-specific third-party software. The same tasks can force end users to spend countless hours in copy-paste purgatory, each minor change necessitating another grueling round of formatting tabs and...

Computer Technology Encyclopedia
Computer Technology Encyclopedia

These days, any attempt to write a full-blown encyclopedia or dictionary of computer terminology would be an exercise in futility. New terms and buzzwords appear every day, and information technology fi elds overlap with so many other fi elds it can be hard to determine if a word is IT, telecommunications, or graphics arts, and so on....

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Flexible Web Design: Creating Liquid and Elastic Layouts with CSS
Flexible Web Design: Creating Liquid and Elastic Layouts with CSS

Take the book you’re holding in your hands right now, and resize it so that it’s easier to read.

Don’t feel bad—I’ve given you an impossible exercise, but I promise the book will be filled with practical instead of ridiculous exercises from here on out. That’s because we’re going to...

Practice Standard for Work Breakdown Structures: Second Edition
Practice Standard for Work Breakdown Structures: Second Edition

The Project Management Institute, Inc. (PMI) standards and guideline publications, of which the document contained herein is one, are developed through a voluntary consensus standards development process. This process brings together volunteers and/or seeks out the views of persons who have an interest in the topic covered by this...

HTML5 Canvas Cookbook
HTML5 Canvas Cookbook

The HTML5 canvas is revolutionizing graphics and visualizations on the Web. Powered by JavaScript, the HTML5 Canvas API enables web developers to create visualizations and animations right in the browser without Flash. Although the HTML5 Canvas is quickly becoming the standard for online graphics and interactivity, many developers fail...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Modern Business Process Automation: YAWL and its Support Environment
Modern Business Process Automation: YAWL and its Support Environment
The held of Business Process Management (BPM) is marred by a seemingly end- less sequence of (proposed) industry standards. Contrary to other fields (e.g.. civil or electronic engineering), these standards are not the result of a v\ idelj supported consolidation of well-understood and well-established concepts and practices. In the...
SharePoint 2010 Site Owner's Manual: Flexible Collaboration without Programming
SharePoint 2010 Site Owner's Manual: Flexible Collaboration without Programming
I’ve been working in SharePoint consulting for over 10 years, and with time I began to realize the lack of books on the market that showed techsavvy business users just how easy SharePoint is to use. I would go in and build systems for major corporations and government agencies around the world, and in most cases toward the end of the...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy