Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Microsoft SQL Server 2008 A BEGINNER'S GUIDE 4/E
Microsoft SQL Server 2008 A BEGINNER'S GUIDE 4/E
There are a couple of reasons why SQL Server, the system that comprises Database Engine, Analysis Services, Reporting Services and Integration Services is the best choice for a broad spectrum of end users and database programmers building business applications:

SQL Server is certainly the best system for Windows operating systems,
...
The End of Software: Transforming Your Business for the On Demand Future
The End of Software: Transforming Your Business for the On Demand Future
Twenty-five years ago, the high-tech business was small, computers were largely relegated to accounting, and the money major corporations spent on information technology barely made a dent in their overall budgets. Today that has all changed. High-tech businesses are some of the largest in the world. The Dow Jones Industrial Average includes four...
MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram)
MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram)
Welcome to the 70-643 Exam Cram! Whether this book is your first or your 15th Exam Cram series book, you'll find information here that will help ensure your success as you pursue knowledge, experience, and certification. This book aims to help you get ready to take and pass the Microsoft certification exam "TS: Windows Server 2008...
Gameplay and design
Gameplay and design
Before we delve into the murky depths of game design, I feel a brief historical overview of the games industry is necessary for the readers who are not familiar with the rapid growth and current state of our fast-paced industry.

The games industry is relatively young compared to most other industries, but it is one of the fastest growing
...
The Hidden Power of Photoshop CS
The Hidden Power of Photoshop CS
AlthoughI wasn’t really thinking about it at the time, in a way, I really started writing this book in 1992 when I first started using Photoshop professionally (with Photoshop 2). At the time I wasn’t planning to write a book, but I had already been involved with scanning and editing digital artwork for several years. I had become...
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
Testing Applications on the Web: Test Planning for Mobile and Internet-Based Systems, Second Edition
A software testing survival guide to deliver winning Internet-based applications

Accessibility, reliability, availability, and security of Web applications on all types of platforms are key to winning business and customers. The technol-ogy continues to change at a fast pace, and savvy end-users are demanding products and services with fewer...

Cocoon 2 Programming: Web Publishing with XML and Java
Cocoon 2 Programming: Web Publishing with XML and Java
Thanks to the tireless efforts of open-source developers, Cocoon has quickly gained visibility as the preeminent XML-based Web publishing framework. Unfortunately, its documentation remains a significant shortcoming. If you’re new to Cocoon, gaining a sense of exactly what you can do with it can be difficult, and actually...
Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition (Practical Aspects of Criminal and Forensic Investigations)
Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition (Practical Aspects of Criminal and Forensic Investigations)
The goal of forensics and crime scene reconstruction is simply to seek the truth. The analyst has no other agenda. In pursuing this end, we revisit what we hope is a not too distant past and attempt to recreate the events that unfolded. This task is anything but simple and the tools employed are all of the forensic disciplines.

Each area
...
Introduction to Electrodynamics (3rd Edition)
Introduction to Electrodynamics (3rd Edition)
An unusually accessible treatment of the fundamentals of electromagnetic theory.

Features a clear, accessible treatment of the fundamentals of electromagnetic theory. Its lean and focused approach employs numerous examples and problems. Carefully discusses subtle or difficult points. Contains numerous, relevant problems
...
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Result Page: 322 321 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy