Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Designing Distributed Learning Environments with Intelligent Software Agents
Designing Distributed Learning Environments with Intelligent Software Agents
This book benefits the AI (artificial intelligence) and educational communities in their research and development, offering new and interesting research issues surrounding the development of distributed learning environments in the Semantic Web age.

With the rapid development of computer network and information technologies, especially
...
Pro InfoPath 2007 (Expert's Voice)
Pro InfoPath 2007 (Expert's Voice)
Pro InfoPath 2007 is an excellent book for developers trying to learn the scope and range of application forms that can be built with Microsoft Office InfoPath 2007. InfoPath is now in its 2nd generation and it enables the creation of rich desktop and web forms using XML technologies and allows gathering of structured, business-critical...
Advanced Breast Cancer:: A Guide to Living with Metastatic Disease, 2nd Edition (Patient Centered Guides)
Advanced Breast Cancer:: A Guide to Living with Metastatic Disease, 2nd Edition (Patient Centered Guides)

An estimated two million Americans alive today have been diagnosed with breast cancer. Each one of them lives with the fear of recurrence, and for good reason: for at least a third of women diagnosed with breast cancer, the disease will eventually spread. When this happens most people assume it means an immediate death sentence. The...

Advanced Data Mining Techniques
Advanced Data Mining Techniques
This book covers the fundamental concepts of data mining, to demonstrate the potential of gathering large sets of data, and analyzing these data sets to gain useful business understanding. The book is organized in three parts. Part I introduces concepts. Part II describes and demonstrates basic data mining algorithms. It also contains chapters on a...
IBM Pseries Sizing And Capacity Planning: A Practical Guide (IBM Redbooks)
IBM Pseries Sizing And Capacity Planning: A Practical Guide (IBM Redbooks)

This IBM Redbook offers a comprehensive guide to properly size and plan the capacity of IBM eServer pSeries systems. It discusses the major hardware, software, benchmarks, and various tools used in the sizing and capacity planning process.

This Redbook is suitable for professionals who want to gain a better understanding of how to size...

Creating a Presentation in Microsoft Office PowerPoint 2007 for Windows: Visual QuickProject Guide
Creating a Presentation in Microsoft Office PowerPoint 2007 for Windows: Visual QuickProject Guide
If you want to make a great presentation fast but don’t want to get bogged down in the details, then you need a Visual QuickProject Guide!

You don’t need to know every feature—you just want to know how to get your project done.

Full-color
...
How to Get Government Contracts: Have a Slice of the 1 Trillion Dollar Pie
How to Get Government Contracts: Have a Slice of the 1 Trillion Dollar Pie

How to Get Government Contracts demystifies the process of how a company can enter the government market, win its first and subsequent contracts, and then grow itself into a multi-million-dollar government contractor within a couple of years. It offers an insider’s view into the latest best practices that government...

Information Trapping: Real-Time Research on the Web
Information Trapping: Real-Time Research on the Web
For a long time—and especially around 1994, when the World Wide Web was just getting its jumpstart—the Internet appeared to many as a vast pool of information just sitting in cyberspace. People who used the Internet for research “cast their nets” by entering queries into a search engine, and then pulled...
Fault-tolerant Flight Control and Guidance Systems: Practical Methods for Small Unmanned Aerial Vehicles (Advances in Industrial Control)
Fault-tolerant Flight Control and Guidance Systems: Practical Methods for Small Unmanned Aerial Vehicles (Advances in Industrial Control)
Unmanned aerial vehicles (UAVs) offer an incomparable means of gathering intelligence and carrying out missions without needing an onboard human pilot. The benefits are considerable in terms of cost, efficiency, and reduced pilot risk.

In order to complete a mission efficiently and with a high level of safety and security, the following key...

Towards a Service-Based Internet: Third European Conference, ServiceWave 2010
Towards a Service-Based Internet: Third European Conference, ServiceWave 2010

The ServiceWave conference series is committed to being the premier European forum for researchers, educators and industrial practitioners to present and discuss the most recent innovations, trends, experiences and concerns in software services (or the “Future of the Internet of Service”) and related underlying infrastructure...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy