In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...
Bring a new level of interactivity and sophistication to your e-learning content with the user-friendly features of Adobe Captivate. This practical tutorial will teach you everything from automatic recording to advanced tips and tricks.
Overview
Enhance your projects by adding interactivity, animations,...
This book introduces a framework of tsunami modelling from generation to propagation, aimed at application to the new observation started in Japan after the devastating tsunami of the 2011 Tohoku-Oki earthquake. About 150 seismic and tsunami sensors were deployed in a wide region off the Pacific coast of eastern Japan in order to...
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...
Signal processing algorithms and architectures have an increasingly important role to play in meeting the central challenges faced in the design of advanced wireless communication systems. In Wireless Communications: Signal Processing Perspectives, leaders in the field describe state-of-the-art research in applying signal processing methodologies...
A data warehouse consists of a set of materialized views that contain derived data from several data sources. Materialized views are beneficial because they allow efficient retrieval of summary data. However, materialized views need to be refreshed periodically in order to avoid staleness. During a materialized view refresh only changes to the base...
Now in its second edition, this best-selling book by Tom Kyte of Ask Tom fame continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into...
This book is your one-stop resource for mastering JIRA extensions and customizations Overview Extend and customize JIRA; work with custom fields, workflows, reports, gadgets, JQL functions, plugins, and more Customize the look and feel of your JIRA user interface by adding new tabs, web items and sections, drop down menus, and more Master JQL...
All the expert guidance you need to understand, build, and operate GPS receivers
The Second Edition of this acclaimed publication enables readers to understand and apply the complex operation principles of global positioning system (GPS) receivers. Although GPS receivers are widely used in everyday life to aid in positioning and navigation,...
Exploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,...
As a document imaging database, Concordance 8 gives you the ability to search through otherwise unmanageable amounts of data to locate just the precise records necessary for the case at hand. The product also boasts extensive case analysis and organization features. This leaves you free to organize and manipulate crucial documents as you...