Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and...
Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

Strategies for Generating E-Business Returns on Investment
Strategies for Generating E-Business Returns on Investment

Companies invest in e-business and its supporting technology for their e-business initiatives. E-Business applications such as supply chain management and customer relationship management improve transaction efficiency and scope economies as well as promoting new product and service offerings and close customer relationships. However, it is...

Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Canon PowerShot G12: From Snapshots to Great Shots
Canon PowerShot G12: From Snapshots to Great Shots

Now that you've bought the amazing Canon PowerShot G12, you need a book that goes beyond a tour of the camera's features to show you exactly how to use your camera to take great pictures. With Canon PowerShot G12: From Snapshots to Great Shots, you get the perfect blend of photography instruction and camera reference that will...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)

Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each...

Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World
Applied Corporate Finance: Questions, Problems and Making Decisions in the Real World

Applied Corporate Finance fills a gap in the existing resources available to students and professionals needing an academically rigorous, yet practically orientated, source of knowledge about corporate finance. Written by an expert in investment analysis, this textbook leads readers to truly understand the principles behind corporate...

Oral Cavity Reconstruction
Oral Cavity Reconstruction

Standing as the most comprehensive reference on oral cancer reconstruction, this handbook serves as an all-encompassing compendium of surgical and cosmetic strategies for the reconstruction of bone, muscles, nerves, arteries, and anatomical structures of the oral cavity- covering wounds extending from the lips to the pharynx with detailed...

unlimited object storage image
Result Page: 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy