Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security + Exam Guide (Testtaker's Guide Series)
Security + Exam Guide (Testtaker's Guide Series)

The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those topics most likely to be addressed on the exam. Written by an experienced network administrator and CompTIA...

Living The 80/20 Way : Work Less, Worry Less, Succeed More, Enjoy More
Living The 80/20 Way : Work Less, Worry Less, Succeed More, Enjoy More
This compelling book focuses on how to succeed personally and professionally by doing less. The author offers ideas and strategies for minimizing our activities and concerns to lead a "less is more" life.

There is a way to relax, enjoy life, put loved ones first, express yourself to the max, and also achieve your dreams....

Dreamweaver 8 : The Missing Manual
Dreamweaver 8 : The Missing Manual

Available for both the Mac and Windows, Macromedia's Dreamweaver 8 is a professional web design and development program used by millions of Internet professionals to build high-quality static and dynamic database-driven web sites. It offers drag-and-drop simplicity, streamlined HTML coding tools, and powerful database integration...

Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
Catastrophe Modeling: A New Approach to Managing Risk (Huebner International Series on Risk, Insurance and Economic Security)
This book had its genesis in June 1996 when the Wharton Risk
Management and Decision Processes Center (Wharton Risk Center) co-hosted
a conference on “Information Technology and Its Impact on Catastrophic
Risks”. It was one of the events that year celebrating the Anniversary of
the first computer (ENIAC) at the
...
Moodle E-learning Course Development
Moodle E-learning Course Development
A complete guide to successful learning using Moodle
- Straight-forward coverage of installing and using the Moodle system
- Working with Moodle features in all learning environments
- A unique course-based approach focuses your attention on designing well structured, interactive, and successful courses

...
Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Fast Track Visual Basic .NET
Fast Track Visual Basic .NET
Aimed at the Visual Basic 6 programmer turning to .NET for the first time, Fast Track Visual Basic .NET provides a worthy, fast-paced introduction to the features and APIs working developers need to get started with VB .NET. The salient feature of this book is its compact size and fast-moving yet approachable tutorial to the new version...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Combating Piracy: Intellectual Property Theft and Fraud
Combating Piracy: Intellectual Property Theft and Fraud
Manifestations of fraud in the early twenty-first century are showing signs of innovations and adaptation in response to shifting opportunities. This book reports on new analyses of intellectual property theft as its most recent expression. Fraud and piracy of products and ideas have become common as the opportunities to commit them expand, and...
Programming INDIGO
Programming INDIGO

Microsoft Code Name “Indigo” is an advanced infrastructure and programming model for creating connected applications. It's like nothing that has come before. That's a bold statement, so allow me to put it in perspective for you.

I wrote my first communication program over 20 years ago and...

Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to...
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
From reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best...
unlimited object storage image
Result Page: 782 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 766 765 764 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy