Home | Amazing | Today | Tags | Publishers | Years | Search 
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Think and Grow Rich
Think and Grow Rich
...During our ten-year association, I learned the missing number to my combination for worldwide successful achievement. The Master Mind Principle: two or more persons working together in complete harmony toward a mutual goal or goals...Napoleon Hill's philosophy teaches you what you were never taught. Specifically: How to Recognize, Relate,...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
Cody's Data Cleaning Techniques Using SAS, Second Edition
Cody's Data Cleaning Techniques Using SAS, Second Edition
Although this book is titled Cody’s Data Cleaning Techniques Using SAS, I hope that it is more than that. It is my hope that not only will you discover ways to detect data errors, but you will also be exposed to some DATA step programming techniques and SAS procedures that might be new to you.

I have been teaching a two-day data
...
Information Processing and Living Systems (Advances in Bioinformatics and Computational Biology)
Information Processing and Living Systems (Advances in Bioinformatics and Computational Biology)
Information processing and information flow occur in the course of an organism's development and throughout its lifespan. Organisms do not exist in isolation, but interact with each other constantly within a complex ecosystem. The relationships between organisms, such as those between prey or predator, host and parasite, and between mating...
The Encyclopedia of Children's Health and Wellness (Facts on File Library of Health and Living)
The Encyclopedia of Children's Health and Wellness (Facts on File Library of Health and Living)
Despite the fact that the risk of childhood disease is lower now than it has been in the past, childhood health care needs remain complex. This is mainly because as society and technology change rapidly, children are routinely exposed to new potential threats. For instance, in the last few years the National Institutes of Health and the Surgeon...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Understanding Exposure: How to Shoot Great Photographs with a Film or Digital Camera (Updated Edition)
Understanding Exposure: How to Shoot Great Photographs with a Film or Digital Camera (Updated Edition)
For serious amateur photographers who already shoot perfectly focused, accurately exposed images but want to be more creative with a camera, here’s the book to consult. More than seventy techniques, both popular and less-familiar approaches, are covered in detail, including advanced exposure, bounced flash and candlelight, infrared, multiple...
The Essential Guide to Flash CS4 with ActionScript
The Essential Guide to Flash CS4 with ActionScript
For any professional designer or developer working in the world of web technologies or multimedia, Flash is the must-have application, and knowing how to use it effectively is vital. Add in ActionScript 3.0, and Flash becomes an even more powerful tool for the development of high-performance web applications.

The Essential Guide to Flash...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy