Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Auditing: A Risk-Based Approach to Conducting a Quality Audit (with ACL CD-ROM)
Auditing: A Risk-Based Approach to Conducting a Quality Audit (with ACL CD-ROM)

Prepare yourself for the dramatic changes in today's auditing environment by using Johnstone/Gramling/Rittenberg's AUDITING: A RISK-BASED APPROACH TO CONDUCTING QUALITY AUDITS, 9th EDITION. This newest edition reflects the clarified auditing standards and the newest PCAOB standards, discusses COSO's updated Internal...

Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)

Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians,...

XQuery from the Experts: A Guide to the W3C XML Query Language
XQuery from the Experts: A Guide to the W3C XML Query Language

"The individual perspectives on the concepts behind the XQuery language offered by XQuery from the Experts will be of great value to those who are seeking to understand the implications, opportunities, and challenges of XQuery as they design future information systems based on XML."
—Michael Champion,
...

Finale 2005 Power!
Finale 2005 Power!
In this book, you’ll learn all about creating professional-quality sheet music with Finale, and if you already know how to do this, you’ll learn how to do it faster. You’ll begin by establishing a solid understanding of Finale’s framework and then mastering the everyday shortcuts and tricks that make Finale a breeze to use....
Practical .NET for Financial Markets
Practical .NET for Financial Markets
Practical .NET for Financial Markets was born because we were convinced no focused literature
existed for people involved in application/product development in financial markets using .NET.
Although a lot of .NET-related material is available, most often it is not relevant for developers in
the finance domain. The finance domain
...
Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G
Mobile Broadband Multimedia Networks: Techniques, Models and Tools for 4G
This books presents the research work of COST 273 Towards Mobile Broadband Multimedia
Networks, hence, it reports on the work performed and on the results achieved within the project
by its participants. The material presented here corresponds to the results obtained in four years
of collaborative work by more than 350 researchers
...
.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Learn How To Convert Web Data Into Web Knowledge

This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...

Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
Over the last thirty years, postcolonial critiques of European imperial practices have transformed our understanding of colonial ideology, resistance, and cultural contact. The Enlightenment has played a complex but often unacknowledged role in this discussion, alternately reviled and venerated as the harbinger of colonial dominion and avatar of...
Programming Entity Framework: Building Data Centric Apps with the ADO.NET Entity Framework
Programming Entity Framework: Building Data Centric Apps with the ADO.NET Entity Framework

Get a thorough introduction to ADO.NET Entity Framework 4 -- Microsoft's core framework for modeling and interacting with data in .NET applications. The second edition of this acclaimed guide provides a hands-on tour of the framework latest version in Visual Studio 2010 and .NET Framework 4. Not only will you learn how to use EF4...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

unlimited object storage image
Result Page: 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy