|
|
|
|
|
| | Investigating Computer CrimeInvestigating Computer Crime will prove a welcome addition to any security department's library. -Security Management
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the... | | |
|
Production RenderingIn the past, rendering systems used a range of different approaches, each compatible and able to handle certain kinds of images. However, the last few years have seen the development of practical techniques, which bring together many areas of research into stable, production ready rendering tools. Written by experienced graphics software... | | From Techie to Boss: Transitioning to Leadership
From Techie to Boss teaches technical people who are making or mulling the transition from team player to team leader all the management techniques and soft leadership skills they never needed before--but need now, pronto.
Veteran team lead and project manager Scott Cromar lays... | | Microsoft Business Intelligence For Dummies
Learn to create an effective business strategy using Microsoft's BI stack
Microsoft Business Intelligence tools are among the most widely used applications for gathering, providing access to, and analyzing data to enable the enterprise to make sound business decisions. The tools include SharePoint Server, the Office... |
|
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |