Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

The Handbook of Information Systems Research
The Handbook of Information Systems Research
This book provides a fresh perspective on issues related to IS research by providing chapters from world-renowned leaders in IS research along with chapters from relative newcomers who bring some interesting and often new perspectives to IS research.

The field of information systems research is undergoing subtle changes as it seeks to...

Masters of the Mind: Exploring the Story of Mental Illness from Ancient Times to the New Millennium
Masters of the Mind: Exploring the Story of Mental Illness from Ancient Times to the New Millennium

The mind is unique in its interest to people from all walks of life. This interest is not new; throughout written history people have observed, described, and pondered strange behaviors and thoughts within themselves and their neighbors. The questions that people have posed about these experiences seem so simple and basic. Why do we seek to...

Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

3ds Max 2012 Bible
3ds Max 2012 Bible
Every time I enter the computer room (which my wife calls the dungeon), my wife still says that I am off to my “fun and games.” I, as always, flatly deny this accusation, saying that it is serious work that I am involved in. But later, when I emerge with a twinkle in my eye and excitedly ask her to take a look at my...
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and Practice
The focused ion beam (FIB) instrument has experienced an intensive period of maturation since its inception. Numerous new techniques and applications have been brought to fruition by the tireless efforts of some very innovative scientists with the foresight to recognize the potential of this upstart apparatus. Over the past few years, the FIB has...
Head First Statistics
Head First Statistics
Wouldn't it be great if there were a statistics book that made histograms, probability distributions, and chi square analysis more enjoyable than going to the dentist? Head First Statistics brings this typically dry subject to life, teaching you everything you want and need to know about statistics through engaging, interactive, and...
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Managing Business with SAP: : Planning Implementation and Evaluation
Managing Business with SAP: : Planning Implementation and Evaluation

Managing Business with SAP: Planning, Implementation and Evaluation is a collection of valuable experiences and perspectives from IT professionals regarding the selection and implementation of SAP.

Managing Business with SAP: Planning, Implementation, and Evaluation covers the basic concepts and principles of ERP/SAP...

How to Do Everything with PowerPoint(R)
How to Do Everything with PowerPoint(R)
Follow real-world examples in this get-you-going guide and create your own PowerPoint presentations--from simple to dazzlingly sophisticated. Prepare slide shows--which you can show on a projection screen or computer monitor--featuring animation, sound, graphics, and even video clips. Edit and format text, add graphs and diagrams, include...
GNU Emacs Pocket Reference
GNU Emacs Pocket Reference
GNU Emacs is the most popular and widespread of the Emacs family of editors. It is also the most powerful and flexible. Unlike all other text editors, GNU Emacs is a complete working environment -- you can stay within Emacs all day without leaving. The GNU Emacs Pocket Reference is a companion volume to O'Reilly's Learning GNU...
unlimited object storage image
Result Page: 112 111 110 109 108 107 106 105 104 103 102 101 100 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy