Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
Planning for Survivable Networks
Planning for Survivable Networks
Keep your network safe from security disasters with a dependable recovery strategy

Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.

In the information-packed pages of this book, Annlee Hines shares her...

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MIDSTORMS NXT to the Next Level is for intermediate-level users of NXT who would like to advance their capabilities by learning some of the basics of electronics. Plenty of examples are provided, and easy-to-follow instructions are included for building over 15 different sensors.

This makes a great...

Adobe Acrobat 8 in the Office
Adobe Acrobat 8 in the Office
Adobe Acrobat is one of the most widely recognized tools for document management, office communications, and improved workflow, and Acrobat 8 is the most powerful version yet, introducing new tools for shared reviews, creating automated forms, license management, additional security, and many others. Now that PDF has become the ubiquitous...
The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Encyclopedia of Electronic Circuits, Vol. 4 (cloth)
Encyclopedia of Electronic Circuits, Vol. 4 (cloth)
Volume 4 of Encyclopedia of Electronic Circuits contains many new, not previously cov ered circuits, organized into 104 chapters. Circuit titles are listed at the beginning of each chapter, for references. Most of these circuits appeared in publications since 1988 and should be very useful for obtaining new ideas for research and...
Adobe Premiere 6 Bible
Adobe Premiere 6 Bible
If Adobe Premiere 6 can do it, you can do it too … Packed with hands-on tutorials and illuminating examples, this comprehensive guide delivers all the know-how you need to edit, create special effects, and output professional-quality digital video with Adobe Premiere. From video capture and editing basics to transitions, type,...
Google Blogger For Dummies (Computer/Tech)
Google Blogger For Dummies (Computer/Tech)
Are you bemused by blogs? Eager to become a blogger? Google Blogger For Dummies can help you start blogging sooner than you think.

More than 14 million people are promoting a business, connecting with family and friends, and sharing opinions with Google Blogger. This book helps you start a Blogger account, create content, build an...

GenXpat: The Young Professional's Guide To Making A Successful Life Abroad
GenXpat: The Young Professional's Guide To Making A Successful Life Abroad
"The first book to deal specifically with the 'GenXpat' generation - the 25-39 age group that typically sets off for the expatriate life when career is their primary consideration. This is my kind of book - it's informative, practical, and you get a real sense that the author knows what she is talking about." Ian Burns of Blackwell's...
Degunking Windows
Degunking Windows

All Windows users know that their PCs slowly develop problems—nasty gunk build-up that plagues their PCs. Here are some of the common symptoms: your PC starts to run slower, your applications will crash without warning, you can’t easily find your files and folders, you start getting tons of spam, and you encounter a host of other...

Microsoft Office Outlook 2003 Inside Out
Microsoft Office Outlook 2003 Inside Out
Ten years ago the average computer user spent most of his or her time using productivity
applications such as Microsoft Word or Microsoft Excel. In the ensuing decade, users have
become more sophisticated, network implementations have become the rule rather than the
exception, and collaboration has become a key facet of a successful
...
Local Area High Speed Networks (MTP)
Local Area High Speed Networks (MTP)
There is a great deal of change happening in the technology being used for local networks. As Web intranets have driven bandwidth needs through the ceiling, inexpensive Ethernet NICs and switches have come into the market. As a result, many network professionals are interested in evaluating these new technologies for implementation consideration....
unlimited object storage image
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy