Home | Amazing | Today | Tags | Publishers | Years | Search 
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Handbook of Software Engineering and Knowledge Engineering: Recent Advances
Handbook of Software Engineering and Knowledge Engineering: Recent Advances

The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Hand book. Each article is written in a way that a practitioner of software engineering and knowledge engineering can...

David Busch's Compact Field Guide for the Canon EOS Rebel T3i/600D
David Busch's Compact Field Guide for the Canon EOS Rebel T3i/600D

Throw away your cheat-sheets and command cards! Are you tired of squinting at tiny color-coded tables on fold-out camera cards? Do you wish you had the most essential information extracted from my comprehensive David Busch’s Canon EOS Rebel T3i/600D Guide to Digital SLR Photography in a size you could tuck away in your camera...

Neural Networks: Computational Models and Applications (Studies in Computational Intelligence)
Neural Networks: Computational Models and Applications (Studies in Computational Intelligence)

Artificial neural networks, or simply called neural networks, refer to the various mathematical models of human brain functions such as perception, computation and memory. It is a fascinating scientific challenge of our time to understand how the human brain works. Modeling neural networks facilitates us in investigating the...

Dreamweaver CS5.5: The Missing Manual
Dreamweaver CS5.5: The Missing Manual

Websites continue to evolve, growing in scope and complexity every year, with new features popping up all the time to make the Web look and work better. Even people building personal websites use various programming languages and server technologies to dish up content.

Throughout its history, Dreamweaver has managed to keep...

System Center Configuration Manager 2007 R3 Complete
System Center Configuration Manager 2007 R3 Complete

Thank you for picking up System Center Configuration Manager 2007 R3 Complete. Whether you are evaluating before implementation, or working with Configuration Manager on a day-to-day basis, this book is meant to give you a well-rounded look at what Configuration Manager can help you do.

If this is your first look at...

Perception-based Data Mining and Decision Making in Economics and Finance (Studies in Computational Intelligence)
Perception-based Data Mining and Decision Making in Economics and Finance (Studies in Computational Intelligence)

The primary goal of this book is to present to the scientific and management communities a selection of applications using more recent Soft Computing (SC) and Computing with Words and Perceptions (CWP) models and techniques meant to solve the economics and financial problems. The selected examples could also serve as a starting point...

Guide to Networking Essentials, Fourth Edition
Guide to Networking Essentials, Fourth Edition

This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft...

The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach
The Architecture of Computer Hardware, Systems Software, & Networking: An Information Technology Approach

The modern world offers lots of readily available online resources for learning. Wikipedia, Google, news sources, millions of Web sites and blogs, even YouTube, offer access to information in nearly any subject that triggers your curiosity and interest. Nonetheless, I continue to believe that for deep understanding of something, nothing...

From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)

Computers are at the heart of most activities nowadays. A processor is the central component of a computer, but nowadays, we can find processors embedded in many other components, such as game consoles, consumer electronic devices and cars, just to mention a few.

This lecture presents a thorough study of the microarchitecture...

jQuery Mobile
jQuery Mobile

Mobile applications come in two basic flavors: native applications, which are compiled programs that run natively on the device, and mobile web applications, which run inside a web browser on the device.

Native applications get almost all of the press these days, especially given the financial success of the iTunes App Store...

Result Page: 112 111 110 109 108 107 106 105 104 103 102 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy