Home | Amazing | Today | Tags | Publishers | Years | Search 
Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

Breakthrough Business Negotiation: A Toolbox for Managers
Breakthrough Business Negotiation: A Toolbox for Managers

Although there are many how-to books on negotiating, they provide little useful guidance on how to conduct complex realworld negotiations. Advice on conducting two-party negotiations about a modest number of issues isn’t hard to come by, but few negotiations are that simple. While dealing with the other side, negotiators typically also...

Investment Valuation 2nd Edition University with Investment Set
Investment Valuation 2nd Edition University with Investment Set

Investment Valuation

Tools and Techniques for Determining the Value of Any Asset
Valuation is at the heart of every investment decision, whether that decision is to buy, sell, or hold. But the pricing of any financial asset has become a more complex task in modern financial markets. Now completely revised and fully updated
...

Applications of Fourier Transforms to Generalized Functions
Applications of Fourier Transforms to Generalized Functions
The generalized function is one of the important branches of mathematics that has enormous application in practical fields. Especially, its applications to the theory of distribution and signal processing are very much noteworthy. The method of generating solutions is the Fourier transform, which has great applications to the...
Pro T-SQL 2012 Programmer's Guide
Pro T-SQL 2012 Programmer's Guide

Pro T–SQL 2012 Programmer’s Guide is every developer’s key to making full use of SQL Server 2012’s powerful, built–in Transact–SQL language. Discussing new and existing features, the book takes you on an expert guided tour of Transact–SQL functionality. Fully functioning examples and...

Programming the Mobile Web
Programming the Mobile Web

With the second edition of this popular book, you’ll learn how to build HTML5 and CSS3-based apps that access geolocation, accelerometer, multi-touch screens, offline storage, and other features in today’s smartphones, tablets, and feature phones. The market for mobile apps continues to evolve at a breakneck pace, and...

Electronic Principles.
Electronic Principles.

This seventh edition of Malvino's classic "Electronic Principles" offers students a definitive overview of electronic circuits and devices. Expert knowledge of electronic devices is presented in a stimulating, clearly written, conversational style. The new, streamlined book design is full-color throughout, with ample, clear...

Analog Design and Simulation using OrCAD Capture and PSpice
Analog Design and Simulation using OrCAD Capture and PSpice

Anyone involved in circuit design that needs the practical know-how it takes to design a successful circuit or product, will find this practical guide to using Capture-PSpice (written by a former Cadence PSpice expert for Europe) an essential book. The text delivers step-by-step guidance on using Capture-PSpice to help professionals produce...

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is...

Optical Network Control: Architecture, Protocols, and Standards
Optical Network Control: Architecture, Protocols, and Standards

Optical Network Control is the first expert guide and single-source reference for controlling and managing optical networks. This book fills the gap between optical network engineering and routing/signaling-helping both optical and IP professionals build networks that are more robust, flexible, manageable, and profitable. Coverage includes:...

Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)
Data Warehousing in the Age of Big Data (The Morgan Kaufmann Series on Business Intelligence)

Web 2.0 has changed the way we conduct business, interact with customers, share information with friends and family, measure success in terms of business revenue and customer wallet share, and define brand management, and, most importantly, it has created a revenue channel like none other. Whether you plan your vacation, buy the newest...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Result Page: 291 290 289 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy