Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Navigating Social Media Legal Risks: Safeguarding Your Business (Que Biz-Tech)
Navigating Social Media Legal Risks: Safeguarding Your Business (Que Biz-Tech)

The plain-English business guide to avoiding social media legal risks and liabilities—for anyone using social media for business—written specifically for non-attorneys!

You already know social media can help you find customers, strengthen relationships, and build your...

Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0
Building RESTful Web Services with Spring 5 - Second Edition: Leverage the power of Spring 5.0, Java SE 9, and Spring Boot 2.0

Find out how to implement the REST architecture to build resilient software in Java with the help of the Spring 5.0 framework.

Key Features

  • Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service,
  • Leverage...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Industrial Applications of Evolutionary Algorithms (Intelligent Systems Reference Library)
Industrial Applications of Evolutionary Algorithms (Intelligent Systems Reference Library)

"Industrial applications of evolutionary algorithms" is intended as a resource for both experienced users of evolutionary algorithms and researchers that are beginning to approach these fascinating optimization techniques.

Experienced users will find interesting details of real-world problems, advice on solving...

Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

Solar Hydrogen Generation: Toward a Renewable Energy Future
Solar Hydrogen Generation: Toward a Renewable Energy Future
Given the backdrop of intense interest and widespread discussion on the prospects of a hydrogen energy economy, this book aims to provide an authoritative and up-to-date scientific account of hydrogen generation using solar energy and renewable sources such as water. While the technological and economic aspects of solar hydrogen generation are...
The Angry Chef: Bad Science and the Truth About Healthy Eating
The Angry Chef: Bad Science and the Truth About Healthy Eating

"The popular understanding of nutrition is clouded by superstitions, primitive intuitions, conspiracy theories, and old wives' tales. This irreverent and intelligent expose brings sanity and good sense to one of life's great pleasures." ―Steven Pinker, author of Angels of Our Better Nature

...

Android Apps Security
Android Apps Security

Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps.

This book will provide developers with the
...

Weight Watchers Weight Loss That Lasts
Weight Watchers Weight Loss That Lasts
Break through the 10 big diet myths!

"In Weight Loss That Lasts, James M. Rippe and Weight Watchers show common sense and good science in a field characterized by chaos and confusion. They expose a series of 10 myths pervasive in the weight-loss industry, revealing both the kernels of truth they contain and how they have been...

Pro ASP.NET Web API: HTTP Web Services in ASP.NET (Expert's Voice in .NET)
Pro ASP.NET Web API: HTTP Web Services in ASP.NET (Expert's Voice in .NET)

Pro ASP.NET Web API shows you how to build flexible, extensible web services that run seamlessly on a range of operating systems and devices, from desktops to tablets to smart phones—even the ones we don’t know today.

ASP.NET Web API is a new framework designed to simplify web service architecture. So if...

Balancing Agility and Discipline: A Guide for the Perplexed
Balancing Agility and Discipline: A Guide for the Perplexed
Agility and discipline: These apparently opposite attributes are, in fact, complementary values in software development. Plan-driven developers must also be agile; nimble developers must also be disciplined. The key to success is finding the right balance between the two, which will vary from project to project according to the circumstances and...
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy