Home | Amazing | Today | Tags | Publishers | Years | Search 
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Deflation: What Happens When Prices Fall
Deflation: What Happens When Prices Fall
MAY 6, 2003, WAS AN EXTRAORDINARY DAY IN Washington, D.C. The Federal Reserve held its Federal Open Market Committee (FOMC) meeting in its two-storied chandeliered boardroom at the central bank's white marble temple on Constitution Avenue. Now, there was nothing unusual about the FOMC gathering. The committee meets...
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
Less Than Zero: The Case for a Falling Price Level in a Growing Economy (Hobart Papers)
One of main features of the 'counter-revolution' in economics which has resulted in the revival of classical liberal ideas has been a change in views about government's ability to control the economy. 'Fiscal fine tuning' is virtually discredited and monetary policy is no longer seen as a means of...
The Hoover Dam (Building America: Then and Now)
The Hoover Dam (Building America: Then and Now)
The time was the early 1930s, the president was Herbert Hoover, and the situation in the United States looked bleak. The stock market had crashed in 1929, and most Americans were hurt by the Great Depression, which left a majority of them jobless, homeless, and penniless. But in the West, a beacon of hope was in the...
Handbook of Chemical Technology and Pollution Control, 3rd Edition, Third Edition
Handbook of Chemical Technology and Pollution Control, 3rd Edition, Third Edition

The objectives of the second edition have been maintained and updated to 2005 in the current volume where users will find that one third of the references, now totaling more than 1300, are new to this edition. At the same time most of the in-depth Further Reading suggestions are new to this volume, and production data of some 30 tables...

Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Information Technology for Management: Improving Strategic and Operational Performance
Information Technology for Management: Improving Strategic and Operational Performance
Students graduating today face a tough job market—making it important that they develop the expertise and critical thinking skills that give them a competitive edge. Information Technology for Management, 8th edition is designed to give students an edge when they face the challenges and opportunities that business...
Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications
Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications
Business intelligence is made possible by the existence of Information Technology. Business intelligence aims to support better business decision-making. To use agile methodologies and to develop Information Technology faster and cheaper is to put an icing on the cake. I doubt that Hans Peter Luhn was aware of the consequences of...
Corrosion Prevention and Protection: Practical Solutions
Corrosion Prevention and Protection: Practical Solutions

There are many books and monographs on corrosion, such as Corrosion and Corrosion Control by H. H. Uhlig and R. W. Revie; Corrosion Engineering by M. G. Fontana and N. D. Greene; Principles and Prevention of Corrosion by D. A. Jones; An Introduction to Corrosion and Protection of Metals by G. Wranglen; and Corrosion for Science and...

The Official Ubuntu Book (7th Edition)
The Official Ubuntu Book (7th Edition)

Ubuntu is a complete, free operating system that emphasizes ease of use, community, and support while enhancing speed, power, and flexibility. It is designed for everyone from computer novices to experts.

This title serves a wide audience: novices who just want to test the waters and give Ubuntu a try,...

ActiveMQ in Action
ActiveMQ in Action

To this day, enterprise message queuing is a concept that is not well understood by most software developers. Commercial message-oriented middleware (MOM) did not help to encourage adoption of the process; most of the MOMs on the market were closed source, were costly to buy and support, and required trained system administrators for...

Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
Prospective Evaluation of Applied Energy Research and Development at DOE (Phase Two)
In recent years, federal oversight of public expenditures has sought to integrate performance and budgeting. Notably, the Government Performance and Results Act (GPRA) was passed in 1993 “in response to questions about the value and effectiveness of federal programs” (GAO, 1997, p. 11). GPRA and other mandates...
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy