Home | Amazing | Today | Tags | Publishers | Years | Search 
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Data Mashups in R
Data Mashups in R

Programmers may spend a good part of their careers scripting code to conform to commercial statistics packages, visualization tools, and domain-specific third-party software. The same tasks can force end users to spend countless hours in copy-paste purgatory, each minor change necessitating another grueling round of formatting tabs and...

Computer Technology Encyclopedia
Computer Technology Encyclopedia

These days, any attempt to write a full-blown encyclopedia or dictionary of computer terminology would be an exercise in futility. New terms and buzzwords appear every day, and information technology fi elds overlap with so many other fi elds it can be hard to determine if a word is IT, telecommunications, or graphics arts, and so on....

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

HTML5 Canvas Cookbook
HTML5 Canvas Cookbook

The HTML5 canvas is revolutionizing graphics and visualizations on the Web. Powered by JavaScript, the HTML5 Canvas API enables web developers to create visualizations and animations right in the browser without Flash. Although the HTML5 Canvas is quickly becoming the standard for online graphics and interactivity, many developers fail...

Modern Business Process Automation: YAWL and its Support Environment
Modern Business Process Automation: YAWL and its Support Environment
The held of Business Process Management (BPM) is marred by a seemingly end- less sequence of (proposed) industry standards. Contrary to other fields (e.g.. civil or electronic engineering), these standards are not the result of a v\ idelj supported consolidation of well-understood and well-established concepts and practices. In the...
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Stunning CSS3: A project-based guide to the latest in CSS (Voices That Matter)
Stunning CSS3: A project-based guide to the latest in CSS (Voices That Matter)

CSS3, the newest version of the style sheet language of the web, is less about creating new effects and more about accomplishing the beautiful web design effects you’re familiar with in fantastic new ways—ways that are more efficient and produce more usable and flexible results than the techniques we’ve been using...

Practice Standard for Work Breakdown Structures: Second Edition
Practice Standard for Work Breakdown Structures: Second Edition

The Project Management Institute, Inc. (PMI) standards and guideline publications, of which the document contained herein is one, are developed through a voluntary consensus standards development process. This process brings together volunteers and/or seeks out the views of persons who have an interest in the topic covered by this...

Flexible Web Design: Creating Liquid and Elastic Layouts with CSS
Flexible Web Design: Creating Liquid and Elastic Layouts with CSS

Take the book you’re holding in your hands right now, and resize it so that it’s easier to read.

Don’t feel bad—I’ve given you an impossible exercise, but I promise the book will be filled with practical instead of ridiculous exercises from here on out. That’s because we’re going to...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy